Re: [PATCH 8/16] Masquerade the siginfo when sending a pid to a foreign namespace

2007-07-09 Thread Pavel Emelianov
[EMAIL PROTECTED] wrote: > Pavel Emelianov [EMAIL PROTECTED] wrote: > | When user send signal from (say) init namespace to any task in a sub > | namespace the siginfo struct must not carry the sender's pid value, as > | this value may refer to some task in the destination namespace and thus > | may

OMAP: Add TI TWL92330/Menelaus Power Management chip driver

2007-07-09 Thread Trilok Soni
Hi Jean/Andrew, Attached patch adds Texas Instruments TWL92330/Menelaus Power Management chip driver. Also includes RTC code in the same driver instead of the separate module. Here is the description of driver/commit message :) = OMAP: Add TI TWL92330/Menelaus Power Management chip

Re: [PATCH 6/16] Helpers to obtain pid numbers

2007-07-09 Thread Pavel Emelianov
[EMAIL PROTECTED] wrote: > Pavel Emelianov [EMAIL PROTECTED] wrote: > | When showing pid to user or getting the pid numerical id for in-kernel > | use the value of this id may differ depending on the namespace. > | > | This set of helpers is used to get the global pid nr, the virtual (i.e. > | see

Re: [kvm-devel] [PATCH][RFC] kvm-scheduler integration

2007-07-09 Thread Rusty Russell
On Tue, 2007-07-10 at 08:53 +0300, Avi Kivity wrote: > Rusty Russell wrote: > > No; this is a "I'm doing something magic and need to know before someone > > else takes the CPU". Almost by definition, you cannot have two of them > > at the same time. Let someone else try that if and when... > > W

Re: Determine version of kernel that produced vmcore

2007-07-09 Thread Vivek Goyal
On Fri, Jul 06, 2007 at 05:58:04PM +0300, Dan Aloni wrote: > On Fri, Jul 06, 2007 at 03:28:14PM +0200, Bernhard Walle wrote: > > Hello, > > > > does anybody know a _reliable_ way to determine the version the kernel > > that produced a vmcore file? This means not scanning for a specific > > string

Re: [PATCH 7/16] Helpers to find the task by its numerical ids

2007-07-09 Thread Pavel Emelianov
[EMAIL PROTECTED] wrote: > Pavel Emelianov [EMAIL PROTECTED] wrote: > | When searching the task by numerical id on may need to find > | it using global pid (as it is done now in kernel) or by its > | virtual id, e.g. when sending a signal to a task from one > | namespace the sender will specify the

Re: [PATCH 2/16] Miscelaneous preparations for namespaces

2007-07-09 Thread Pavel Emelianov
Cedric Le Goater wrote: > Pavel Emelianov wrote: >> The most importaint change is moving exit_task_namespaces() >> inside exit_notify() to makes it possible to notify the >> exiting task's parent. However this should be done before >> release_task() to address the issue pointed by Sukadev with >> N

Re: [PATCH 1/16] Round up the API

2007-07-09 Thread Pavel Emelianov
Cedric Le Goater wrote: > Pavel Emelianov wrote: >> The set of functions process_session, task_session, process_group >> and task_pgrp is confusing, as the names can be mixed with each other >> when looking at the code for a long time. >> >> The proposals are to >> * equip the functions that return

Re: Documentation of kernel messages (Summary)

2007-07-09 Thread Dave Young
Hi, On 7/9/07, H. Peter Anvin <[EMAIL PROTECTED]> wrote: Kunai, Takashi wrote: > (1) Your kernel development proposal will be greatly supported by > Japanese vendor community. At the same time, it needs support from the > kernel communities, as well. There is a very strong reason for the kernel

Re: Determine version of kernel that produced vmcore

2007-07-09 Thread Vivek Goyal
On Fri, Jul 06, 2007 at 03:28:14PM +0200, Bernhard Walle wrote: > Hello, > > does anybody know a _reliable_ way to determine the version the kernel > that produced a vmcore file? This means not scanning for a specific > string or something like that which can fail on random memory. > > Would it m

Re: maps2-add-proc-pid-pagemap-interface.patch

2007-07-09 Thread Matt Mackall
On Tue, Jul 10, 2007 at 02:28:50PM +1000, Rusty Russell wrote: > On Mon, 2007-07-09 at 17:31 -0500, Matt Mackall wrote: > > > And how about "cpu_to_le16(1) == 1" instead of "ntohl(1) != 1"? > > > > Why? > > Using a networking macro to detect endianness is old school: we have the > nice explicit m

Re: [patch 09/10] Remove the SLOB allocator for 2.6.23

2007-07-09 Thread Matt Mackall
On Tue, Jul 10, 2007 at 11:58:44AM +1000, Nick Piggin wrote: > Christoph Lameter wrote: > >On Tue, 10 Jul 2007, Nick Piggin wrote: > > > > > >>>O(n) memory savings? What is that? > >> > >>Allocate n things and your memory waste is proportional to n (well that's > >>O(n) waste, so I guess by savings

Re: [PATCH 1/4] try parent numa_node at first before using default

2007-07-09 Thread Yinghai Lu
On 7/9/07, Greg KH <[EMAIL PROTECTED]> wrote: On Mon, Jul 09, 2007 at 05:52:34PM -0700, Christoph Lameter wrote: > It means that the node for the device is the same as the parent device. > F.e. if the parent device is a bus that is connected to node 4 then all > the devices hooked up to the bus a

Re: Documentation of kernel messages (Summary)

2007-07-09 Thread Oliver Neukum
Am Dienstag, 10. Juli 2007 schrieb Satyam Sharma: > But, I'm not sure they'd be operating against a known target -- I don't > really know what exactly would be hashed, but if it's kernel printk() > messages (the format string, obviously), then please remember that > new messages would get added all

Re: [PATCH 17/20] SMP: Implement on_cpu()

2007-07-09 Thread Avi Kivity
Satyam Sharma wrote: > > > On 7/9/07, Andi Kleen <[EMAIL PROTECTED]> wrote: >> [...] >> on_each_cpu() was imho always a mistake. It would have been better >> to just fix smp_call_function() directly > > I'm not sure what you mean by "fix" here, but if you're proposing > that we change smp_call_func

Re: [Hdaps-devel] [PATCH] hdaps - switch to using input-polldev

2007-07-09 Thread Shem Multinymous
On 7/9/07, Dmitry Torokhov <[EMAIL PROTECTED]> wrote: > Sounds good, then. It's a bit of a hack, but the benefits are well > worth it (if we can resolve the scheduling issue). You know, I slept on it and I think I want to move the polldev into opposite direction - to accomodte devices that need

Re: [kvm-devel] [PATCH][RFC] kvm-scheduler integration

2007-07-09 Thread Avi Kivity
Rusty Russell wrote: > On Mon, 2007-07-09 at 09:39 +0300, Avi Kivity wrote: > >> Rusty Russell wrote: >> >>> I think a "struct preempt_ops *" and a "void *preempt_ops_data" inside >>> every task struct is a better idea. Call the config option >>> PREEMPT_SCHED_HOOKS and now there's nothing

Re: x86 setup code rewrite in C

2007-07-09 Thread Jeff Garzik
H. Peter Anvin wrote: This patch set replaces the x86 setup code, which is currently all in assembly, with a version written in C, using the ".code16gcc" feature of binutils (which has been present since at least 2001.) The new code is vastly easier to read, and, I hope, debug. It should be not

Re: [PATCH 6/16] Helpers to obtain pid numbers

2007-07-09 Thread sukadev
Pavel Emelianov [EMAIL PROTECTED] wrote: | When showing pid to user or getting the pid numerical id for in-kernel | use the value of this id may differ depending on the namespace. | | This set of helpers is used to get the global pid nr, the virtual (i.e. | seen by task in its namespace) nr and th

[PATCH] x86_64 - Use non locked version for local_cmpxchg()

2007-07-09 Thread Mathieu Desnoyers
You are completely right: on x86_64, a bit got lost in the move to cmpxchg.h, here is the fix. It applies on 2.6.22-rc6-mm1. x86_64 - Use non locked version for local_cmpxchg() local_cmpxchg() should not use any LOCK prefix. This change probably got lost in the move to cmpxchg.h. Signed-off-by:

Re: PXA2xx keyboard driver fix

2007-07-09 Thread Dmitry Torokhov
On Monday 09 July 2007 09:27, Rodolfo Giometti wrote: > On Mon, Jul 09, 2007 at 11:49:13AM +0300, Mike Rapoport wrote: > > The PXA2xx keyboard driver does not compile with 2.6.22 > > The following patch fixes it > > > > Signed-off-by: Mike Rapoport <[EMAIL PROTECTED]> > > > > Applied, thank you

[PATCH] Kprobes on select architectures no longer EXPERIMENTAL

2007-07-09 Thread Ananth N Mavinakayanahalli
From: Ananth N Mavinakayanahalli <[EMAIL PROTECTED]> Based on usage and testing over the past couple of years, kprobes on i386, ia64, powerpc and x86_64 is no longer EXPERIMENTAL. This is a follow-up to Robert P.J. Day's patch making "Instrumentation support" non-EXPERIMENTAL: http://mar

Re: Sysfs and suicidal attributes

2007-07-09 Thread Tejun Heo
Hello, Alan. Alan Stern wrote: > You remember the problem we faced with "suicidal" sysfs attributes and > the device_schedule_callback() routine that fixes it? Sure. > Well, it turns out that this approach may confict with suspend/resume > processing. In brief, it's not a good idea to unregist

[git pull] Input updates for post-2.6.22

2007-07-09 Thread Dmitry Torokhov
[Let's see if I manage to create pull request that can be cut-n-pasted...] Linus, Please pull from: git://git.kernel.org/pub/scm/linux/kernel/git/dtor/input.git for-linus or master.kernel.org:/pub/scm/linux/kernel/git/dtor/input.git for-linus to receive updates for input subs

sysfs: release mutex when kmalloc() failed in sysfs_open_file().

2007-07-09 Thread YOSHIFUJI Hideaki / 吉藤英明
Signed-off-by: YOSHIFUJI Hideaki <[EMAIL PROTECTED]> -- diff --git a/fs/sysfs/file.c b/fs/sysfs/file.c index b502c71..1f64ce5 100644 --- a/fs/sysfs/file.c +++ b/fs/sysfs/file.c @@ -283,6 +283,7 @@ static int sysfs_open_file(struct inode *inode, struct file *file) mutex_lock(&inode->i_mute

Re: [PATCH 1/4] try parent numa_node at first before using default

2007-07-09 Thread Greg KH
On Mon, Jul 09, 2007 at 05:52:34PM -0700, Christoph Lameter wrote: > On Mon, 9 Jul 2007, Greg KH wrote: > > > > @@ -547,6 +547,8 @@ static void klist_children_put(struct klist_node *n) > > > > > > void device_initialize(struct device *dev) > > > { > > > + int node; > > > + > > > kobj_set_kse

Re: Determine version of kernel that produced vmcore

2007-07-09 Thread Dan Aloni
On Mon, Jul 09, 2007 at 10:49:38PM +0200, Bernhard Walle wrote: > Hi, > > * Dan Aloni <[EMAIL PROTECTED]> [2007-07-09 13:41]: > > > > A patch that I am working on will make it possible to integrate > > > > the output of 'makedumpinfo -g' into vmlinux as the final build > > > > stage of the kernel.

Re: [patch -rss] Make RSS accounting display more user friendly

2007-07-09 Thread Balbir Singh
Peter Zijlstra wrote: > On Sun, 2028-02-27 at 02:39 -0500, Balbir Singh wrote: > >> I am not a CLUI expert, but rounding off bytes will something that >> the administrators will probably complain about. Since we manage >> the controller memory in pages, it might be the easiest unit to use. >> The

Re: x86 setup code rewrite in C

2007-07-09 Thread H. Peter Anvin
Yinghai Lu wrote: is possible to put 16bit c in seperate directory. or rename them with _16.c? They *ARE* in a separate directory, specifically arch/i386/boot. All the *.c files in there are 16 bits; the 32-bit code is in arch/i386/boot/compressed or arch/i386/kernel. -hpa - To u

Re: [PATCH 4/16] Change data structures for pid namespaces

2007-07-09 Thread sukadev
Cedric Le Goater [EMAIL PROTECTED] wrote: | Pavel Emelianov wrote: | > struct pid_namespace will have the kmem_cache to allocate | > the pids from, the parent, as they are hierarchical, and | > the level of nesting value. | > | > struct pid will have a variable length array of pid_number-s | > one

Re: maps2-add-proc-pid-pagemap-interface.patch

2007-07-09 Thread Rusty Russell
On Mon, 2007-07-09 at 17:31 -0500, Matt Mackall wrote: > > And how about "cpu_to_le16(1) == 1" instead of "ntohl(1) != 1"? > > Why? Using a networking macro to detect endianness is old school: we have the nice explicit macros these days... > > > + while (pm.count > 0 && vma) { > > > + if

Re: SMART problems in 2.6.22

2007-07-09 Thread Douglas Gilbert
Kai Makisara wrote: > On Sun, 8 Jul 2007, Bruce Allen wrote: > >> Mark, David, Doug, Tejin, Alan, Jeff, LKML, >> >> I'm afraid that there may be some problem with SMART + libata in the 2.6.22 >> kernel. An hour ago I discovered that I missed a month of correspondence >> (some LKML, some private)

Re: [PATCH 0/16] Pid namespaces

2007-07-09 Thread sukadev
I am not able to find a specific patch that this might be in, but what happens when the child-reaper of a container exits ? Do you terminate all processes in the container ? I thought that was discussed earlier and the consensus was to terminate all processes in that container and its subordinate c

Re: x86 setup code rewrite in C

2007-07-09 Thread Yinghai Lu
On 7/9/07, H. Peter Anvin <[EMAIL PROTECTED]> wrote: This patch set replaces the x86 setup code, which is currently all in assembly, with a version written in C, using the ".code16gcc" feature of binutils (which has been present since at least 2001.) The new code is vastly easier to read, and, I

Re: [PATCH 8/16] Masquerade the siginfo when sending a pid to a foreign namespace

2007-07-09 Thread sukadev
Pavel Emelianov [EMAIL PROTECTED] wrote: | When user send signal from (say) init namespace to any task in a sub | namespace the siginfo struct must not carry the sender's pid value, as | this value may refer to some task in the destination namespace and thus | may confuse the application. Also, do

Re: [PATCH 7/16] Helpers to find the task by its numerical ids

2007-07-09 Thread sukadev
Pavel Emelianov [EMAIL PROTECTED] wrote: | When searching the task by numerical id on may need to find | it using global pid (as it is done now in kernel) or by its | virtual id, e.g. when sending a signal to a task from one | namespace the sender will specify the task's virtual id. | | Signed-off

Re: [Hdaps-devel] [PATCH] hdaps - switch to using input-polldev

2007-07-09 Thread Dmitry Torokhov
On Monday 09 July 2007 02:06, Shem Multinymous wrote: > > > > Have 2nd input device's ->open() method call input_open_device() for > > > > the first one. > > > > > > Won't that create an overhead by the redundant, unused notifications? > > > > They won't leave input core so nothing really noticeabl

[x86 setup 32/33] Use the new x86 setup code for x86-64; unify with i386

2007-07-09 Thread H. Peter Anvin
From: H. Peter Anvin <[EMAIL PROTECTED]> This unifies arch/*/boot (except arch/*/boot/compressed) between i386 and x86-64, and uses the new x86 setup code for x86-64 as well. Signed-off-by: H. Peter Anvin <[EMAIL PROTECTED]> --- arch/x86_64/boot/Makefile| 136 +-- arch/x86_64/bo

[x86 setup 31/33] Use the new x86 setup code for i386

2007-07-09 Thread H. Peter Anvin
From: H. Peter Anvin <[EMAIL PROTECTED]> This patch hooks the new x86 setup code into the Makefile machinery. It also adapts boot/tools/build.c to a two-file (as opposed to three-file) universe, and simplifies it substantially. Signed-off-by: H. Peter Anvin <[EMAIL PROTECTED]> --- arch/i386/boo

[x86 setup 30/33] Linker script for the new x86 setup code

2007-07-09 Thread H. Peter Anvin
From: H. Peter Anvin <[EMAIL PROTECTED]> Linker script to define the layout of the new x86 setup code. Includes assert for size overflow and a misaligned setup header. Signed-off-by: H. Peter Anvin <[EMAIL PROTECTED]> --- arch/i386/boot/setup.ld | 54 +++

[x86 setup 29/33] Assembly header and main routine for new x86 setup code

2007-07-09 Thread H. Peter Anvin
From: H. Peter Anvin <[EMAIL PROTECTED]> The assembly header and initialization code, and the main() routine. main.c also contains some miscellaneous very short routines. Signed-off-by: H. Peter Anvin <[EMAIL PROTECTED]> --- arch/i386/boot/header.S | 283

[x86 setup 28/33] Code for actual protected-mode entry

2007-07-09 Thread H. Peter Anvin
From: H. Peter Anvin <[EMAIL PROTECTED]> This is the code which actually does the switch to protected mode, including all preparation. It is also responsible for invoking the boot loader hooks, if present. Signed-off-by: H. Peter Anvin <[EMAIL PROTECTED]> --- arch/i386/boot/pm.c | 170

[x86 setup 27/33] Video mode probing support for the new x86 setup code

2007-07-09 Thread H. Peter Anvin
From: H. Peter Anvin <[EMAIL PROTECTED]> Video mode probing for the new x86 setup code. This code breaks down different drivers into modules. This code deliberately drops support for a lot of the vendor-specific mode probing present in the assembly version, since a lot of those probes have been

[x86 setup 26/33] Voyager support for the new x86 setup code

2007-07-09 Thread H. Peter Anvin
From: H. Peter Anvin <[EMAIL PROTECTED]> Voyager support for the new x86 setup code. This implements the same functionality as the assembly version. Signed-off-by: H. Peter Anvin <[EMAIL PROTECTED]> --- arch/i386/boot/voyager.c | 46 ++ 1 files chan

[x86 setup 25/33] Memory probing support for the new x86 setup code

2007-07-09 Thread H. Peter Anvin
From: H. Peter Anvin <[EMAIL PROTECTED]> Probe memory (INT 15h: E820, E801, 88). Signed-off-by: H. Peter Anvin <[EMAIL PROTECTED]> --- arch/i386/boot/memory.c | 99 +++ 1 files changed, 99 insertions(+), 0 deletions(-) create mode 100644 arch/i386/b

[x86 setup 24/33] MCA support for new x86 setup code

2007-07-09 Thread H. Peter Anvin
From: H. Peter Anvin <[EMAIL PROTECTED]> MCA probing support for the new x86 setup code. This implements the same functionality as the assembly version. Signed-off-by: H. Peter Anvin <[EMAIL PROTECTED]> --- arch/i386/boot/mca.c | 43 +++ 1 files changed

[x86 setup 23/33] EDD probing code for the new x86 setup code

2007-07-09 Thread H. Peter Anvin
From: H. Peter Anvin <[EMAIL PROTECTED]> Probe EDD and MBR signatures, in order to make it easier to map physical hard drives to BIOS drives. Signed-off-by: H. Peter Anvin <[EMAIL PROTECTED]> --- arch/i386/boot/edd.c | 196 ++ 1 files changed, 196

[x86 setup 22/33] CPU features verification for the new x86 setup code

2007-07-09 Thread H. Peter Anvin
From: H. Peter Anvin <[EMAIL PROTECTED]> Verify that the CPU has enough features to run the kernel. This may entail enabling features on some CPUs. By doing this in the setup code we can be guaranteed to still be able to write to the console through the BIOS. Signed-off-by: H. Peter Anvin <[EMA

[x86 setup 21/33] Version string for the new x86 setup code

2007-07-09 Thread H. Peter Anvin
From: H. Peter Anvin <[EMAIL PROTECTED]> Module which only includes the kernel version string. Signed-off-by: H. Peter Anvin <[EMAIL PROTECTED]> --- arch/i386/boot/version.c | 23 +++ 1 files changed, 23 insertions(+), 0 deletions(-) create mode 100644 arch/i386/boot/versi

[x86 setup 20/33] Console-writing code for the new x86 setup code

2007-07-09 Thread H. Peter Anvin
From: H. Peter Anvin <[EMAIL PROTECTED]> This implements writing text to the console, including printf(). Signed-off-by: H. Peter Anvin <[EMAIL PROTECTED]> --- arch/i386/boot/printf.c | 331 +++ arch/i386/boot/tty.c| 112 2 files

[x86 setup 19/33] Command-line parsing code for the new x86 setup code

2007-07-09 Thread H. Peter Anvin
From: H. Peter Anvin <[EMAIL PROTECTED]> Simple command-line parser which allows us to access the kernel command line from the setup code. Signed-off-by: H. Peter Anvin <[EMAIL PROTECTED]> --- arch/i386/boot/cmdline.c | 97 ++ 1 files changed, 97 ins

[x86 setup 18/33] APM probing code

2007-07-09 Thread H. Peter Anvin
From: H. Peter Anvin <[EMAIL PROTECTED]> APM probing code for the new x86 setup code. This implements the same functionality as the assembly version. Signed-off-by: H. Peter Anvin <[EMAIL PROTECTED]> --- arch/i386/boot/apm.c | 97 ++ 1 files cha

Re: [PATCH -rc7 1/1] netpoll: Fix a leak-n-bug in netpoll_cleanup()

2007-07-09 Thread David Miller
From: Satyam Sharma <[EMAIL PROTECTED]> Date: Wed, 04 Jul 2007 16:36:41 +0530 > From: Satyam Sharma <[EMAIL PROTECTED]> > > [1/1] netpoll: Fix a leak-n-bug in netpoll_cleanup() > > 93ec2c723e3f8a216dde2899aeb85c648672bc6b applied excessive duct tape to > the netpoll beast's netpoll_cleanup(), th

Re: [PATCH] net : make ip_tos2prio const

2007-07-09 Thread David Miller
From: Philippe De Muyter <[EMAIL PROTECTED]> Date: Fri, 6 Jul 2007 13:30:44 +0200 > Hi all, > > Make ip_tos2prio `const'. > > Signed-off-by: Philippe De Muyter <[EMAIL PROTECTED]> Applied, thank you. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a mess

[x86 setup 17/33] A20 handling code

2007-07-09 Thread H. Peter Anvin
From: H. Peter Anvin <[EMAIL PROTECTED]> A20 handling code for the new x86 setup code. This implements the same algorithms as the assembly version. Signed-off-by: H. Peter Anvin <[EMAIL PROTECTED]> --- arch/i386/boot/a20.c | 161 ++ 1 files chang

[x86 setup 16/33] String-handling functions for the new x86 setup code.

2007-07-09 Thread H. Peter Anvin
From: H. Peter Anvin <[EMAIL PROTECTED]> strcmp(), memcpy(), memset(), as well as routines to copy to and from other segments (as pointed to by fs and gs). Signed-off-by: H. Peter Anvin <[EMAIL PROTECTED]> --- arch/i386/boot/copy.S | 101 +++ arch/i

[x86 setup 15/33] Simple bitops for the new x86 setup code.

2007-07-09 Thread H. Peter Anvin
From: H. Peter Anvin <[EMAIL PROTECTED]> A simple collection of bitops for the new x86 setup code. Signed-off-by: H. Peter Anvin <[EMAIL PROTECTED]> --- arch/i386/boot/bitops.h | 45 + 1 files changed, 45 insertions(+), 0 deletions(-) create mode 10

[x86 setup 14/33] Top header file for new x86 setup code

2007-07-09 Thread H. Peter Anvin
From: H. Peter Anvin <[EMAIL PROTECTED]> Top header file for the new x86 setup code. Signed-off-by: H. Peter Anvin <[EMAIL PROTECTED]> --- arch/i386/boot/boot.h | 290 + 1 files changed, 290 insertions(+), 0 deletions(-) create mode 100644 arch/i

[x86 setup 13/33] Header file to produce 16-bit code with gcc

2007-07-09 Thread H. Peter Anvin
From: H. Peter Anvin <[EMAIL PROTECTED]> gcc for i386 can be used with the assembly prefix ".code16gcc" to generate 16-bit (real-mode) code. This header file provides the assembly prefix. Signed-off-by: H. Peter Anvin <[EMAIL PROTECTED]> --- arch/i386/boot/code16gcc.h |9 + 1 files

[x86 setup 12/33] x86-64: add symbolic constants for the boot segment selectors

2007-07-09 Thread H. Peter Anvin
From: H. Peter Anvin <[EMAIL PROTECTED]> Add symbolic constants for the segment selectors/GDT slots used by the setup code, for consistency with i386. Signed-off-by: H. Peter Anvin <[EMAIL PROTECTED]> --- include/asm-x86_64/segment.h |8 1 files changed, 8 insertions(+), 0 deletions

[x86 setup 11/33] x86-64: add CONFIG_PHYSICAL_ALIGN for consistency with i386

2007-07-09 Thread H. Peter Anvin
From: H. Peter Anvin <[EMAIL PROTECTED]> Add CONFIG_PHYSICAL_ALIGN (currently as a hardcoded constant) to provide consistency with i386. This value is manifest in the bzImage header. Signed-off-by: H. Peter Anvin <[EMAIL PROTECTED]> --- arch/x86_64/Kconfig |4 1 files changed, 4 insert

[x86 setup 10/33] Make struct boot_params a real structure, and remove obsolete fields

2007-07-09 Thread H. Peter Anvin
From: H. Peter Anvin <[EMAIL PROTECTED]> Make struct boot_params a real structure, and remove the handling of some obsolete fields, in particular hd*_info, which was only used by the ST-506 driver, and likely to be wrong for that driver on any modern BIOS. Signed-off-by: H. Peter Anvin <[EMAIL PR

[x86 setup 09/33] Make definitions for struct e820entry and struct e820map consistent

2007-07-09 Thread H. Peter Anvin
From: H. Peter Anvin <[EMAIL PROTECTED]> Make definitions for struct e820entry and struct e820map consistent between i386 and x86-64. Signed-off-by: H. Peter Anvin <[EMAIL PROTECTED]> --- arch/i386/kernel/e820.c |2 +- include/asm-i386/e820.h | 14 -- include/asm-x86_64/e82

Re: Determine version of kernel that produced vmcore

2007-07-09 Thread Ken'ichi Ohmichi
Hi, On Fri, 6 Jul 2007 17:58:04 +0300, Dan Aloni <[EMAIL PROTECTED]> wrote: > On Fri, Jul 06, 2007 at 03:28:14PM +0200, Bernhard Walle wrote: > > Hello, > > > > does anybody know a _reliable_ way to determine the version the kernel > > that produced a vmcore file? This means not scanning for a s

[x86 setup 08/33] Define zero-page offset 0x1e4 as a scratch field, and use it

2007-07-09 Thread H. Peter Anvin
From: H. Peter Anvin <[EMAIL PROTECTED]> The relocatable kernel code needs a scratch field for the decompressor to determine its own location. It was using a location inside struct screen_info; reserve a free location and document it as scratch instead. Signed-off-by: H. Peter Anvin <[EMAIL PROT

[x86 setup 07/33] Use a new CPU feature word to cover all Intel features that are spread around

2007-07-09 Thread H. Peter Anvin
From: Venki Pallipadi <[EMAIL PROTECTED]> in different CPUID leafs like 0x5, 0x6 and 0xA. Make this feature detection code common across i386 and x86_64. Display Intel Dynamic Acceleration feature in /proc/cpuinfo. This feature will be enabled automatically by current acpi-cpufreq driver. Refer

[x86 setup 06/33] Clean up struct screen_info ()

2007-07-09 Thread H. Peter Anvin
From: H. Peter Anvin <[EMAIL PROTECTED]> struct screen_info has unaligned members, it needs to be packed. In the process, fix the naming of some of the members, which don't belong in this structure but are part of it anyway. Signed-off-by: H. Peter Anvin <[EMAIL PROTECTED]> --- include/linux/scr

[x86 setup 05/33] Change CONFIG_X86_MINIMUM_CPU_MODEL to CONFIG_X86_MINIMUM_CPU_FAMILY

2007-07-09 Thread H. Peter Anvin
From: H. Peter Anvin <[EMAIL PROTECTED]> CONFIG_X86_MINIMUM_CPU_MODEL, so change it to CONFIG_X86_MINIMUM_CPU_FAMILY. Also, the default minimum should be 3, not 0. Signed-off-by: H. Peter Anvin <[EMAIL PROTECTED]> --- arch/i386/Kconfig.cpu |6 +++--- arch/i386/kernel/verify_cpu.S |

[x86 setup 04/33] Unify the CPU features vectors between i386 and x86-64

2007-07-09 Thread H. Peter Anvin
From: H. Peter Anvin <[EMAIL PROTECTED]> Unify the handling of the CPU features vectors between i386 and x86-64. This also adopts the collapsing of features which are required at compile-time into constant tests from x86-64 to i386. Signed-off-by: H. Peter Anvin <[EMAIL PROTECTED]> --- arch/i386

[x86 setup 03/33] include/asm-i386/boot.h: This is , not

2007-07-09 Thread H. Peter Anvin
From: H. Peter Anvin <[EMAIL PROTECTED]> include/asm-i386/boot.h incorrectly has the multiple include guards as _LINUX_BOOT_H instead of _ASM_BOOT_H. Fix. Signed-off-by: H. Peter Anvin <[EMAIL PROTECTED]> --- include/asm-i386/boot.h |6 +++--- 1 files changed, 3 insertions(+), 3 deletions(-

Re: [PATCH] Remove process freezer from suspend to RAM pathway

2007-07-09 Thread Kyle Moffett
Thanks for the detailed reply! On Jul 09, 2007, at 22:07:15, Nigel Cunningham wrote: On Friday 06 July 2007 15:01:48 Kyle Moffett wrote: Suppose hibernate is implemented like this: (1) Userspace program calls sys_freeze_processes() (a) Pokes all CPUs with IPMIs and tells them to finish the

[x86 setup 02/33] hd.c: remove BIOS/CMOS queries

2007-07-09 Thread H. Peter Anvin
From: H. Peter Anvin <[EMAIL PROTECTED]> An ST-506 disk these days is pretty much someone trying to pull ancient data using an auxilliary controller. Pulling data from the BIOS or CMOS is just plain wrong, since it's likely to be the primary OS disk... and would be user-entered data anyway. Inst

[x86 setup 01/33] x86 setup: MAINTAINERS: formally take responsibility for the i386 boot code

2007-07-09 Thread H. Peter Anvin
From: H. Peter Anvin <[EMAIL PROTECTED]> Change MAINTAINERS to formally take responsibility for the i386 boot code. Signed-off-by: H. Peter Anvin <[EMAIL PROTECTED]> --- MAINTAINERS |4 ++-- 1 files changed, 2 insertions(+), 2 deletions(-) diff --git a/MAINTAINERS b/MAINTAINERS index df40a4

x86 setup code rewrite in C

2007-07-09 Thread H. Peter Anvin
This patch set replaces the x86 setup code, which is currently all in assembly, with a version written in C, using the ".code16gcc" feature of binutils (which has been present since at least 2001.) The new code is vastly easier to read, and, I hope, debug. It should be noted that I found a fair n

mptsas drops then re-adds hard drive

2007-07-09 Thread Philippe Troin
System info: Linux 2.6.20-1.2320.fc5 SMP x86_64 lspci: 00:06.0 PCI bridge: Advanced Micro Devices [AMD] AMD-8111 PCI (rev 07) 00:07.0 ISA bridge: Advanced Micro Devices [AMD] AMD-8111 LPC (rev 05) 00:07.1 IDE interface: Advanced Micro Devices [AMD] AMD-8111 IDE (rev 03) 00:07.2 SMBus: Advanced Mic

Re: [patch 09/10] Remove the SLOB allocator for 2.6.23

2007-07-09 Thread Matt Mackall
On Mon, Jul 09, 2007 at 06:51:51PM -0700, Christoph Lameter wrote: > On Tue, 10 Jul 2007, Nick Piggin wrote: > > > > O(n) memory savings? What is that? > > > > Allocate n things and your memory waste is proportional to n (well that's > > O(n) waste, so I guess by savings I mean that SLOB's memory

[PATCH 020 of 20] knfsd: nfsd: enforce per-flavor id squashing

2007-07-09 Thread NeilBrown
From: J. Bruce Fields <[EMAIL PROTECTED]> Allow root squashing to vary per-pseudoflavor, so that you can (for example) allow root access only when sufficiently strong security is in use. Signed-off-by: "J. Bruce Fields" <[EMAIL PROTECTED]> Signed-off-by: Neil Brown <[EMAIL PROTECTED]> ### Diffs

Re: Hibernation Redesign

2007-07-09 Thread Jeremy Maitin-Shepard
Al Boldi <[EMAIL PROTECTED]> writes: [snip] > Who said we need two kernels? You could inline it like Xen, which would give > you one kernel with two modes: normal and hibernate. I don't know a whole lot about xen, but it seems that one issue with this approach is that it requires you run your

[PATCH 019 of 20] knfsd: nfsd: allow auth_sys nlm on rpcsec_gss exports

2007-07-09 Thread NeilBrown
From: J. Bruce Fields <[EMAIL PROTECTED]> Our clients (like other clients, as far as I know) use only auth_sys for nlm, even when using rpcsec_gss for the main nfs operations. Administrators that want to deny non-kerberos-authenticated locking requests will need to turn off NFS protocol versions

[PATCH 017 of 20] knfsd: nfsd4: implement secinfo

2007-07-09 Thread NeilBrown
From: Andy Adamson <[EMAIL PROTECTED]> Implement the secinfo operation. (Thanks to Usha Ketineni wrote an earlier version of this support.) Cc: Usha Ketineni <[EMAIL PROTECTED]> Signed-off-by: Andy Adamson <[EMAIL PROTECTED]> Signed-off-by: "J. Bruce Fields" <[EMAIL PROTECTED]> Signed-off-by: N

[PATCH 018 of 20] knfsd: nfsd4: secinfo handling without secinfo= option

2007-07-09 Thread NeilBrown
From: J. Bruce Fields <[EMAIL PROTECTED]> We could return some sort of error in the case where someone asks for secinfo on an export without the secinfo= option set--that'd be no worse than what we've been doing. But it's not really correct. So, hack up an approximate secinfo response in that c

[PATCH 015 of 20] knfsd: nfsd4: make readonly access depend on pseudoflavor

2007-07-09 Thread NeilBrown
From: J. Bruce Fields <[EMAIL PROTECTED]> Allow readonly access to vary depending on the pseudoflavor, using the flag passed with each pseudoflavor in the export downcall. Signed-off-by: "J. Bruce Fields" <[EMAIL PROTECTED]> Signed-off-by: Neil Brown <[EMAIL PROTECTED]> ### Diffstat output ./i

[PATCH 016 of 20] knfsd: rpc: add gss krb5 and spkm3 oid values

2007-07-09 Thread NeilBrown
From: Usha Ketineni <[EMAIL PROTECTED]> Adds oid values to the gss_api mechanism structures. On the NFSV4 server side, these are required as part of the security triple (oid,qop,service) information being sent in the response of the SECINFO operation. Signed-off-by: Usha Ketineni <[EMAIL PROTEC

[PATCH 013 of 20] knfsd: nfsd: factor out code from show_expflags

2007-07-09 Thread NeilBrown
From: J. Bruce Fields <[EMAIL PROTECTED]> Factor out some code to be shared by secinfo display code. Remove some unnecessary conditional printing of commas where we know the condition is true. Signed-off-by: "J. Bruce Fields" <[EMAIL PROTECTED]> Signed-off-by: Neil Brown <[EMAIL PROTECTED]> ##

[PATCH 014 of 20] knfsd: nfsd: display export secinfo information

2007-07-09 Thread NeilBrown
From: J. Bruce Fields <[EMAIL PROTECTED]> Add secinfo information to the display in proc/net/sunrpc/nfsd.export/content. Signed-off-by: "J. Bruce Fields" <[EMAIL PROTECTED]> Signed-off-by: Neil Brown <[EMAIL PROTECTED]> ### Diffstat output ./fs/nfsd/export.c | 29

[PATCH 012 of 20] knfsd: nfsd4: make readonly access depend on pseudoflavor

2007-07-09 Thread NeilBrown
From: J. Bruce Fields <[EMAIL PROTECTED]> Allow readonly access to vary depending on the pseudoflavor, using the flag passed with each pseudoflavor in the export downcall. The rest of the flags are ignored for now, though some day we might also allow id squashing to vary based on the flavor. Si

[PATCH 000 of 20] knfsd: Support 'secinfo' exports with related cleanups

2007-07-09 Thread NeilBrown
With this patchset it becomes possible to list a number of different security flavours that maybe used to access an exported filesystem, and to attach different export options (e.g. readonly, rootsquash) to different flavours. Also, NFSv4 can report which flavours are available on a particular expo

[PATCH 001 of 20] knfsd: nfsd: make all exp_finding functions return -errno's on err

2007-07-09 Thread NeilBrown
From: J. Bruce Fields <[EMAIL PROTECTED]> Currently exp_find(), exp_get_by_name(), and friends, return an export on success, and on failure return: errors -EAGAIN (drop this request pending an upcall) or -ETIMEDOUT (an upcall has timed out), or return NULL, which

[PATCH 010 of 20] knfsd: nfsd: factor nfsd_lookup into 2 pieces

2007-07-09 Thread NeilBrown
From: J. Bruce Fields <[EMAIL PROTECTED]> Factor nfsd_lookup into nfsd_lookup_dentry, which finds the right dentry and export, and a second part which composes the filehandle (and which will later check the security flavor on the new export). No change in behavior. Signed-off-by: "J. Bruce Fiel

[PATCH 011 of 20] knfsd: nfsd4: return nfserr_wrongsec

2007-07-09 Thread NeilBrown
From: [EMAIL PROTECTED] <[EMAIL PROTECTED]> Make the first actual use of the secinfo information by using it to return nfserr_wrongsec when an export is found that doesn't allow the flavor used on this request. Signed-off-by: J. Bruce Fields <[EMAIL PROTECTED]> Signed-off-by: Andy Adamson <[EMAI

[PATCH 008 of 20] knfsd: nfsd: set rq_client to ip-address-determined-domain

2007-07-09 Thread NeilBrown
From: J. Bruce Fields <[EMAIL PROTECTED]> We want it to be possible for users to restrict exports both by IP address and by pseudoflavor. The pseudoflavor information has previously been passed using special auth_domains stored in the rq_client field. After the preceding patch that stored the p

[PATCH 009 of 20] knfsd: nfsd: use ip-address-based domain in secinfo case

2007-07-09 Thread NeilBrown
From: J. Bruce Fields <[EMAIL PROTECTED]> With this patch, we fall back on using the gss/pseudoflavor only if we fail to find a matching auth_unix export that has a secinfo list. As long as sec= options aren't used, there's still no change in behavior here (except possibly for some additional au

[PATCH 006 of 20] knfsd: nfsd: remove superfluous assignment from nfsd_lookup

2007-07-09 Thread NeilBrown
From: J. Bruce Fields <[EMAIL PROTECTED]> The "err" variable will only be used in the final return, which always happens after either the preceding err = fh_compose(...); or after the following err = nfserrno(host_err); So the earlier assignment to err is ignored. Signed-off-

[PATCH 007 of 20] knfsd: nfsd: provide export lookup wrappers which take a svc_rqst

2007-07-09 Thread NeilBrown
From: J. Bruce Fields <[EMAIL PROTECTED]> Split the callers of exp_get_by_name(), exp_find(), and exp_parent() into those that are processing requests and those that are doing other stuff (like looking up filehandles for mountd). No change in behavior, just a (fairly pointless, on its own) clean

[PATCH 005 of 20] knfsd: nfsd4: simplify exp_pseudoroot arguments

2007-07-09 Thread NeilBrown
From: J. Bruce Fields <[EMAIL PROTECTED]> We're passing three arguments to exp_pseudoroot, two of which are just fields of the svc_rqst. Soon we'll want to pass in a third field as well. So let's just give up and pass in the whole struct svc_rqst. Also sneak in some minor style cleanups while

[PATCH 004 of 20] knfsd: nfsd4: parse secinfo information in exports downcall

2007-07-09 Thread NeilBrown
From: [EMAIL PROTECTED] <[EMAIL PROTECTED]> We add a list of pseudoflavors to each export downcall, which will be used both as a list of security flavors allowed on that export, and (in the order given) as the list of pseudoflavors to return on secinfo calls. This patch parses the new downcall i

[PATCH 002 of 20] knfsd: nfsd4: build rpcsec_gss whenever nfsd4 is built

2007-07-09 Thread NeilBrown
From: J. Bruce Fields <[EMAIL PROTECTED]> Select rpcsec_gss support whenever asked for NFSv4 support. The rfc actually requires gss, and gss is also the main reason to migrate to v4. We already do this on the client side. Signed-off-by: "J. Bruce Fields" <[EMAIL PROTECTED]> Signed-off-by: Neil

[PATCH 003 of 20] knfsd: nfsd4: store pseudoflavor in request

2007-07-09 Thread NeilBrown
From: [EMAIL PROTECTED] <[EMAIL PROTECTED]> Add a new field to the svc_rqst structure to record the pseudoflavor that the request was made with. For now we record the pseudoflavor but don't use it for anything. Signed-off-by: Andy Adamson <[EMAIL PROTECTED]> Signed-off-by: "J. Bruce Fields" <[E

Re: [patch 09/10] Remove the SLOB allocator for 2.6.23

2007-07-09 Thread Christoph Lameter
On Tue, 10 Jul 2007, Nick Piggin wrote: > It is reasonable to expect some help from maintainers, but I notice you > didn't even CC the SLOB maintainer in the patch to remove SLOB! So maybe > if you tried working a bit closer with him you could get better results? The maintainers last patch to SLO

Re: maps2-make-proc-pid-smaps-optional-under-config_embedded.patch

2007-07-09 Thread Rusty Russell
On Mon, 2007-07-09 at 15:24 -0500, Matt Mackall wrote: > On Sun, Jul 08, 2007 at 04:19:34PM +1000, Rusty Russell wrote: > > Matt wrote: > > > This interface is primarily useful for doing memory profiling and not > > > much use > > > on deployed embedded boxes. Make it optional. Together with > >

  1   2   3   4   5   6   >