On Wed, 26 Dec 2007 18:34:26 +1100, James Morris said:
> Can you post your .config ?
The gzip'ed config as of when I quit bisecting is attached. It's probably
not directly usable unless you have a quilt tree that's positioned fairly
close to git-lblnet.patch.
> Also, is that the plain upstream
H. Peter Anvin, le Tue 25 Dec 2007 15:45:21 -0800, a écrit :
> Samuel Thibault wrote:
> >The console is now by default in UTF-8 mode, so let's document this.
> >BTW, document the needed "vt." prefix.
> >
> >-vt.default_blu= [VT]
> >+default_blu=[VT]
>
> Reverse patch?
Erf, yes, it loo
There's some section mismatch warnings :
MODPOST vmlinux.o
WARNING: vmlinux.o(.text+0x1685c): Section mismatch: reference to
.init.data: (between 'check_dev_quirk' and 'apm_error')
WARNING: vmlinux.o(.text+0x1687b): Section mismatch: reference to
.init.data: (between 'check_dev_quirk' and 'apm_er
On Wed, 26 Dec 2007, [EMAIL PROTECTED] wrote:
> On Wed, 26 Dec 2007 18:34:26 +1100, James Morris said:
>
> > Can you post your .config ?
>
> The gzip'ed config as of when I quit bisecting is attached. It's probably
> not directly usable unless you have a quilt tree that's positioned fairly
> cl
Hi,
I want to support a new PCI based VGA card in
linux. I want to know what is the VGA driver stack in
the Linux. Can any one help me where to start.
-Pradeep
Pradeep Annavarapu
Moschip Semiconductor
Hyderabad
Forgot the famous last words? Access your message archive online at
http:
On Dec 26, 2007 2:48 AM, H. Peter Anvin <[EMAIL PROTECTED]> wrote:
> Cyrill Gorcunov wrote:
> > Hi list,
> >
> > by doing cleanup of arch/x86/boot/*.[ch] i found that
> > checkpatch does ignore obvious things. For example,
> > run it over edd.c showed only one warning:
> >
> > BTW, is there someone
On Mon, Dec 24, 2007 at 04:58:42PM +0530, Dhaval Giani wrote:
> Hi,
>
> Just hit this on sched-devel. (not sure how to reproduce it yet, can't
> try now. I believe i can hit it on mainline as well as there is nothing
> scheduler specific).
>
http://bugzilla.kernel.org/show_bug.cgi?id=9483
-ane
This trivial patch removes some unused stuffs from tpm_bios.c (against
2.6.24-rc6)
Signed-off-by: Nguyen Anh Quynh <[EMAIL PROTECTED]>
diff --git a/drivers/char/tpm/tpm_bios.c b/drivers/char/tpm/tpm_bios.c
index 60a2d26..09bb95a 100644
--- a/drivers/char/tpm/tpm_bios.c
+++ b/drivers/char/tpm/tpm_b
From: Carsten Otte <[EMAIL PROTECTED]>
This patch moves implementation of the following functions from
kvm_main.c to x86.c:
free_pio_guest_pages, vcpu_find_pio_dev, pio_copy_data, complete_pio,
kernel_pio, pio_string_write, kvm_emulate_pio, kvm_emulate_pio_string
The function inject_gp, which was
Now that rex_prefix is part of the decode cache, there is no need to pass
it along.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/x86_emulate.c |6 +++---
1 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/drivers/kvm/x86_emulate.c b/drivers/kvm/x86_emulate.c
index
From: Carsten Otte <[EMAIL PROTECTED]>
This patch moves the implementation of get_apic_base and set_apic_base
from kvm_main.c to x86.c
Signed-off-by: Carsten Otte <[EMAIL PROTECTED]>
Reviewed-by: Christian Borntraeger <[EMAIL PROTECTED]>
Acked-by: Hollis Blanchard <[EMAIL PROTECTED]>
Signed-off-b
From: Zhang Xiantao <[EMAIL PROTECTED]>
First step to split kvm_vcpu. Currently, we just use an macro to define
the common fields in kvm_vcpu for all archs, and all archs need to define
its own kvm_vcpu struct.
Signed-off-by: Zhang Xiantao <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PR
The second 2.6.25 kvm patch series, for your review. Three more to go.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.
From: Eddie Dong <[EMAIL PROTECTED]>
Signed-off-by: Yaozu (Eddie) Dong <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/i8259.c |6 ++
drivers/kvm/irq.h |1 +
2 files changed, 3 insertions(+), 4 deletions(-)
diff --git a/drivers/kvm/i8259.c b/driver
This will help trap accesses to guest memory in atomic context.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/kvm_main.c |2 ++
1 files changed, 2 insertions(+), 0 deletions(-)
diff --git a/drivers/kvm/kvm_main.c b/drivers/kvm/kvm_main.c
index ff77175..005f2d5 100644
--- a/dr
Split guest reset code out of vmx_vcpu_setup(). Besides being cleaner, this
moves the realmode tss setup (which can sleep) outside vmx_vcpu_setup()
(which is executed with preemption enabled).
[izik: remove unused variable]
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/kvm.h
From: Eddie Dong <[EMAIL PROTECTED]>
Signed-off-by: Yaozu (Eddie) Dong <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/ioapic.c | 17 +
drivers/kvm/irq.h|1 +
2 files changed, 14 insertions(+), 4 deletions(-)
diff --git a/drivers/kvm/io
From: Izik Eidus <[EMAIL PROTECTED]>
Reserve a few memory slots for kernel internal use. This is good for case
you have to register memory region and you want to be sure it was not
registered from userspace, and for case you want to register a memory region
that won't be seen from userspace.
Sig
From: Izik Eidus <[EMAIL PROTECTED]>
kvm_vm_ioctl_set_memory_region() is able to remove memory in addition to
adding it. Therefore when using kernel swapping support for old userspaces,
we need to munmap the memory if the user request to remove it
Signed-off-by: Izik Eidus <[EMAIL PROTECTED]>
Si
From: Laurent Vivier <[EMAIL PROTECTED]>
This patch lets GCC to determine which registers to save when we
switch to/from a VCPU in the case of intel i386.
* Original code saves following registers:
eax, ebx, ecx, edx, edi, esi, ebp (using popa)
* Patched code:
- informs GCC that we modif
From: Izik Eidus <[EMAIL PROTECTED]>
Remove kvm memory slot allocation mechanism from the ioctl
and put it to exported function.
Signed-off-by: Izik Eidus <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/kvm.h |3 +++
drivers/kvm/kvm_main.c | 17 ++
Emulation may cause a shadow pte to be instantiated, which requires
memory resources. Make sure the caches are filled to avoid an oops.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/mmu.c |4
1 files changed, 4 insertions(+), 0 deletions(-)
diff --git a/drivers/kvm/mmu.
From: Izik Eidus <[EMAIL PROTECTED]>
Currently kvm has a wart in that it requires three extra pages for use
as a tss when emulating real mode on Intel. This patch moves the allocation
internally, only requiring userspace to tell us where in the physical address
space we can place the tss.
Signed
From: Laurent Vivier <[EMAIL PROTECTED]>
This patch lets GCC to determine which registers to save when we
switch to/from a VCPU in the case of intel x86_64.
* Original code saves following registers:
rax, rbx, rcx, rdx, rsi, rdi, rbp,
r8, r9, r10, r11, r12, r13, r14, r15
* Patched code:
The code that dispatches the page fault and emulates if we failed to map
is duplicated across vmx and svm. Merge it to simplify further bugfixing.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/mmu.c | 36
drivers/kvm/svm.c | 33 +--
From: Carsten Otte <[EMAIL PROTECTED]>
This patch moves the definition of segment_descriptor_64 for AMD64 and
EM64T from kvm_main.c to segment_descriptor.h. It also adds a proper
#ifndef...#define...#endif around that header file.
The implementation of segment_base is moved from kvm_main.c to x86.
From: Laurent Vivier <[EMAIL PROTECTED]>
This patch lets GCC to determine which registers to save when we
switch to/from a VCPU in the case of AMD x86_64.
* Original code saves following registers:
rbx, rcx, rdx, rsi, rdi, rbp,
r8, r9, r10, r11, r12, r13, r14, r15
* Patched code:
- i
From: Carsten Otte <[EMAIL PROTECTED]>
This patch splits kvm_vm_ioctl into archtecture independent parts, and
x86 specific parts which go to kvm_arch_vcpu_ioctl in x86.c.
The patch is unchanged since last submission.
Common ioctls for all architectures are:
KVM_CREATE_VCPU, KVM_GET_DIRTY_LOG, KVM
From: Laurent Vivier <[EMAIL PROTECTED]>
This patch lets GCC to determine which registers to save when we
switch to/from a VCPU in the case of AMD i386
* Original code saves following registers:
ebx, ecx, edx, esi, edi, ebp
* Patched code:
- informs GCC that we modify following registers
From: Carsten Otte <[EMAIL PROTECTED]>
This patch moves the definitions of CR0_RESERVED_BITS,
CR4_RESERVED_BITS, and CR8_RESERVED_BITS along with the following
functions from kvm_main.c to x86.c:
set_cr0(), set_cr3(), set_cr4(), set_cr8(), get_cr8(), lmsw(),
load_pdptrs()
The static function wrapp
Share the common parts of SrcReg and DstReg decoding.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/x86_emulate.c | 80 +---
1 files changed, 31 insertions(+), 49 deletions(-)
diff --git a/drivers/kvm/x86_emulate.c b/drivers/kvm/x86_emula
From: Anthony Liguori <[EMAIL PROTECTED]>
KVM's nopage handler calls gfn_to_page() which acquires the mmap_sem when
calling out to get_user_pages(). nopage handlers are already invoked with the
mmap_sem held though. Introduce a __gfn_to_page() for use by the nopage
handler which requires the loc
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/x86_emulate.c | 337 -
1 files changed, 177 insertions(+), 160 deletions(-)
diff --git a/drivers/kvm/x86_emulate.c b/drivers/kvm/x86_emulate.c
index b352a6c..64888a6 100644
--- a/drivers/kvm
From: Sheng Yang <[EMAIL PROTECTED]>
This patch based on CR8/TPR patch, and enable the TPR shadow (FlexPriority)
for 32bit Windows. Since TPR is accessed very frequently by 32bit
Windows, especially SMP guest, with FlexPriority enabled, we saw significant
performance gain.
Signed-off-by: Sheng Y
From: Carsten Otte <[EMAIL PROTECTED]>
This patch moves the following functions to from kvm_main.c to x86.c:
emulator_read/write_std, vcpu_find_pervcpu_dev, vcpu_find_mmio_dev,
emulator_read/write_emulated, emulator_write_phys,
emulator_write_emulated_onepage, emulator_cmpxchg_emulated,
get_setmen
From: Hollis Blanchard <[EMAIL PROTECTED]>
Signed-off-by: Hollis Blanchard <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/kvm.h |7 +++
drivers/kvm/kvm_main.c | 25 -
drivers/kvm/x86.c | 22 ++
3
From: Uri Lublin <[EMAIL PROTECTED]>
Recommended by Izik Eidus.
Signed-off-by: Uri Lublin <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/kvm_main.c |2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/drivers/kvm/kvm_main.c b/drivers/kvm/kv
From: Christian Borntraeger <[EMAIL PROTECTED]>
Currently kvm provides hypercalls only for x86* architectures. To
provide hypercall infrastructure for other kvm architectures I split
kvm_para.h into a generic header file and architecture specific
definitions.
Signed-off-by: Christian Borntraeger
Instructions like 'inc reg' that have the register operand encoded
in the opcode are currently specially decoded. Extend
decode_register_operand() to handle that case, indicated by having
DstReg or SrcReg without ModRM.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/x86_emulate.c
From: Eddie Dong <[EMAIL PROTECTED]>
Add comments for secondary/primary Processor-Based VM-execution controls.
Signed-off-by: Yaozu (Eddie) Dong <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/vmx.h | 10 --
1 files changed, 8 insertions(+), 2 deletion
From: Hollis Blanchard <[EMAIL PROTECTED]>
Signed-off-by: Hollis Blanchard <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/kvm.h |3 +
drivers/kvm/kvm_main.c | 107 +---
drivers/kvm/x86.c | 103 +
If vmx fails to inject a real-mode interrupt while fetching the interrupt
redirection table, it fails to record this in the vectoring information
field. So we detect this condition and do it ourselves.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/vmx.c | 51 +++
From: Hollis Blanchard <[EMAIL PROTECTED]>
Signed-off-by: Hollis Blanchard <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/kvm.h | 10 +
drivers/kvm/kvm_main.c | 442 +---
drivers/kvm/x86.c | 427 +
From: Hollis Blanchard <[EMAIL PROTECTED]>
Signed-off-by: Hollis Blanchard <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/kvm.h |1 +
drivers/kvm/kvm_main.c | 177 +---
drivers/kvm/x86.c | 175 +
Hello,
WARNING: vmlinux.o(.text+0x46b04): Section mismatch: reference to
.init.text:sun4v_ktsb_register (between 'smp_callin' and
'smp_fill_in_sib_core_maps')
WARNING: vmlinux.o(.text+0x4756c): Section mismatch: reference to
.init.text:sun4v_register_mondo_queues (between 'after_lock_tlb' and
Hi,
my NFS server seems not to utilize the read-ahead feature, my exported
dir is located on ext3 fs over sata disk. the sata controller can
issue commands up to 1MB, also I modified the read ahead under the sys
to 1MB. but when the client do reads in 32KB chunks (rsize), I can see
in the server si
Hello, Rusty Russell.
Rusty Russell wrote:
> ATA relies so heavily on scsi that it needs to be converted at the
> same time.
>
> ATA adds padding to scatterlists in scsi commands, but because there was
> no good way of appending to those scatterlists, it had to use boutique
> iterators to make su
Hello,
Jeff Garzik wrote:
>> ata3.00: limiting speed to UDMA/33:PIO4
>> ata3.00: exception Emask 0x0 Sact 0x0 Serr 0x0 action 0x2
>> ata3.00: BMDMA stat 0x6
>> ata3.00: cmd ca/00:08:47:66:6e/00:00:00:00:00/eb tag 0 dma 4096 out
>> res 51/84:08:47:66:6e/00:00:00:00:00/eb Emask 0x30 (host bus
Distributed storage documentation.
Algorithms used in the system, userspace interfaces
(sysfs dirs and files), design and implementation details
are described here.
Signed-off-by: Evgeniy Polyakov <[EMAIL PROTECTED]>
diff --git a/Documentation/dst/algorithms.txt b/Documentation/dst/algorithms.
Hello all,
I've seen that Trond and the other guys at Netapp are working hard on
the NFS support and there are dozens of patches in latest
2.6.24rcX s kernels regarding both RPC and NFS.
I can only hope, as Andrew Morton said, that the policy of new NFS impl
was 'dont break'.
In the end those
We pass vcpu, vmx->fail, and vmx->launched to assembly code, but all three
are fields within vmx. Consolidate by only passing in vmx and offsets for
the rest.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/vmx.c | 146 ++--
1 files
From: Zhang Xiantao <[EMAIL PROTECTED]>
Will be called once arch module registers itself.
Signed-off-by: Zhang Xiantao <[EMAIL PROTECTED]>
Acked-by: Carsten Otte <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/kvm.h |4 +-
drivers/kvm/kvm_main.c | 61
From: Izik Eidus <[EMAIL PROTECTED]>
This changes kvm_write_guest_page/kvm_read_guest_page to use
copy_to_user/read_from_user, as a result we get better speed
and better dirty bit tracking.
Signed-off-by: Izik Eidus <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kv
From: Izik Eidus <[EMAIL PROTECTED]>
Check for the "error hva", an address outside the user address space that
signals a bad gfn.
Signed-off-by: Izik Eidus <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/kvm.h |1 +
drivers/kvm/kvm_main.c | 11 +++
From: Sheng Yang <[EMAIL PROTECTED]>
The current 'lods' and 'stos' is depending on incoming CR2 rather than decode
memory address from registers.
Signed-off-by: Sheng Yang <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/x86_emulate.c | 14 ++
1 fil
From: Zhang Xiantao <[EMAIL PROTECTED]>
Signed-off-by: Zhang Xiantao <[EMAIL PROTECTED]>
Acked-by: Carsten Otte <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/kvm_main.c |1 -
drivers/kvm/x86.c |2 ++
drivers/kvm/x86.h |2 ++
3 files change
From: Zhang Xiantao <[EMAIL PROTECTED]>
Move kvm_vcpu_ioctl_translate to arch, since mmu would be put under arch.
Signed-off-by: Zhang Xiantao <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/kvm.h |3 +++
drivers/kvm/kvm_main.c | 24 +-
From: Zhang Xiantao <[EMAIL PROTECTED]>
Add the following hooks:
void decache_vcpus_on_cpu(int cpu);
int kvm_arch_vcpu_init(struct kvm_vcpu *vcpu);
void kvm_arch_vcpu_uninit(struct kvm_vcpu *vcpu);
void kvm_arch_vcpu_free(struct kvm_vcpu *vcpu);
void kvm_arch_vcpu_load(struct kvm_vcpu *
From: Eddie Dong <[EMAIL PROTECTED]>
Add wbinvd VM Exit support to prepare for pass-through
device cache emulation and also enhance real time
responsiveness.
Signed-off-by: Yaozu (Eddie) Dong <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/vmx.c | 11 +
Instead of injecting real-mode interrupts by writing the interrupt frame into
guest memory, abuse vmx by injecting a software interrupt. We need to
pretend the software interrupt instruction had a length > 0, so we have to
adjust rip backward.
This lets us not to mess with writing guest memory, w
The 'mov abs' instruction family (opcodes 0xa0 - 0xa3) still depends on cr2
provided by the page fault handler. This is wrong for several reasons:
- if an instruction accessed misaligned data that crosses a page boundary,
and if the fault happened on the second page, cr2 will point at the
sec
From: Carsten Otte <[EMAIL PROTECTED]>
This patch moves the implementation of the functions of kvm_get/set_msr,
kvm_get/set_msr_common, and set_efer from kvm_main.c to x86.c. The
definition of EFER_RESERVED_BITS is moved too.
Signed-off-by: Carsten Otte <[EMAIL PROTECTED]>
Acked-by: Hollis Blanch
From: Dor Laor <[EMAIL PROTECTED]>
Every write access to guest pages should be tracked.
Signed-off-by: Dor Laor <[EMAIL PROTECTED]>
Signed-off-by: Izik Eidus <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/kvm_main.c |1 +
1 files changed, 1 insertions(+), 0
From: Izik Eidus <[EMAIL PROTECTED]>
it is removed beacuse it isnt supported on a real host
Signed-off-by: Izik Eidus <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/x86_emulate.c |3 ---
1 files changed, 0 insertions(+), 3 deletions(-)
diff --git a/drivers
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/kvm_main.c |4 +---
1 files changed, 1 insertions(+), 3 deletions(-)
diff --git a/drivers/kvm/kvm_main.c b/drivers/kvm/kvm_main.c
index 302473d..dacdc66 100644
--- a/drivers/kvm/kvm_main.c
+++ b/drivers/kvm/kvm_main.c
@@ -1335,21 +
From: Zhang Xiantao <[EMAIL PROTECTED]>
Make KVM_CHECK_EXTENSION code into a function, all archs can define its
capability independently.
Signed-off-by: Zhang Xiantao <[EMAIL PROTECTED]>
Acked-by: Carsten Otte <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/kvm.
We'll want to write to it in order to fix real-mode irq injection problems,
but it is a read-only field. Storing it in a variable solves that issue.
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/vmx.c | 17 -
1 files changed, 12 insertions(+), 5 deletions(-)
di
From: Izik Eidus <[EMAIL PROTECTED]>
Convert a guest frame number to the corresponding host virtual address.
Signed-off-by: Izik Eidus <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/kvm_main.c | 25 +
1 files changed, 17 insertions(+),
From: Zhang Xiantao <[EMAIL PROTECTED]>
Move some includes to x86.c from kvm_main.c, since the related functions
have been moved to x86.c
Signed-off-by: Zhang Xiantao <[EMAIL PROTECTED]>
Acked-by: Carsten Otte <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/kvm_
From: Zhang Xiantao <[EMAIL PROTECTED]>
Signed-off-by: Zhang Xiantao <[EMAIL PROTECTED]>
Acked-by: Carsten Otte <[EMAIL PROTECTED]>
Signed-off-by: Avi Kivity <[EMAIL PROTECTED]>
---
drivers/kvm/kvm.h |5 +++--
drivers/kvm/kvm_main.c | 26 ++
drivers/kvm/x86.c
Distributed storage: Groundhogs strike back: no New Year for humans
I'm pleased to announce the 13'th release of the distributed
storage subsystem (DST).
DST allows to form a storage on top of local and remote nodes
and combine them into linear or mirroring setup, which in
turn can be exported t
Core distributed storage files.
Include userspace interfaces, initialization,
block layer bindings and other core functionality.
Signed-off-by: Evgeniy Polyakov <[EMAIL PROTECTED]>
diff --git a/drivers/block/Kconfig b/drivers/block/Kconfig
index b4c8319..ca6592d 100644
--- a/drivers/block/Kconf
Network state machine.
Includes network async processing state machine and related tasks.
Signed-off-by: Evgeniy Polyakov <[EMAIL PROTECTED]>
diff --git a/drivers/block/dst/kst.c b/drivers/block/dst/kst.c
new file mode 100644
index 000..6d92014
--- /dev/null
+++ b/drivers/block/dst/kst.c
@
Algorithms used in distributed storage.
Mirror and linear mapping code.
Signed-off-by: Evgeniy Polyakov <[EMAIL PROTECTED]>
diff --git a/drivers/block/dst/alg_linear.c b/drivers/block/dst/alg_linear.c
new file mode 100644
index 000..2f9ed65
--- /dev/null
+++ b/drivers/block/dst/alg_linear.c
On Tue, Dec 25, 2007 at 04:50:04PM -0500, Erez Zadok wrote:
> Using v2.6.24-rc6-125-g5356f66, code such as this:
>
> if (is_file)/* dirs can be unlinked but chdir'ed to */
> err = -ESTALE;
>
> produces this false checkpatch error:
>
> foo.c:947: ERROR: trailing stat
On Sun, Dec 23, 2007 at 06:22:14PM +, Alexander Eichhorn wrote:
>
> BUG: unable to handle kernel paging request at virtual address f800
> printing eip:
> c03bbc8c
> *pde =
> Oops: [#1]
> PREEMPT
> Modules linked in:
> CPU:0
> EIP:0060:[]Not tainted VLI
> EFLAGS: 0
On Wed, 26 Dec 2007, James Morris wrote:
> What does the following say ?
>
> # sestatus && rpm -q selinux-policy
Don't worry about that -- I reproduced it with Paul Moore's git tree:
git://git.infradead.org/users/pcmoore/lblnet-2.6_testing
(under current -mm, the e1000 driver doesn't find my e
On Wed, 26 Dec 2007, Rusty Russell wrote:
> On Friday 21 December 2007 00:33:42 Glauber de Oliveira Costa wrote:
> > + if (!vcpu_id) {
> > + /*
> > +* Service input, then unset the BREAK to
> > +* release the Waker.
> > +
On Dec 25, 2007, at 5:04 PM, Andrew Morton wrote:
On Sun, 23 Dec 2007 12:35:17 +0100 Gianluca Alberici
<[EMAIL PROTECTED]> wrote:
Hello,
I can do better. I have investigated a bit the problem:
1) The problem arises only with the userspace nfsd (Universal nfsd
2.2).
I have realized that t
On Wednesday, 26 of December 2007, Linus Torvalds wrote:
>
> On Tue, 25 Dec 2007, Rafael J. Wysocki wrote:
> >
> > the ACPI specification between versions 1.0x and 2.0. Namely, while ACPI
> > 2.0 and later wants us to put devices into low power states before calling
> > _PTS, ACPI 1.0x wants us t
On Wednesday, 26 of December 2007, Alan Stern wrote:
> On Tue, 25 Dec 2007, Rafael J. Wysocki wrote:
>
> > > > Do we need to worry about the possibility that when the system wakes up
> > > > from hibernation, the set of usable CPUs might be smaller than it was
> > > > beforehand?
> > >
> > > Th
Hi Arnd,
This patch adds device tree source, default config and setup code for
DBox2 devices.
ia > Cool stuff. I used to have one of these boxes myself, maybe I should
get one again when it's hitting mainline.
Is this already a complete port, or do you also need some device
drivers or boot
From: Julia Lawall <[EMAIL PROTECTED]>
The functions time_before, time_before_eq, time_after, and time_after_eq
are more robust for comparing jiffies against other values.
A simplified version of the semantic patch making this change is as follows:
(http://www.emn.fr/x-info/coccinelle/)
//
@ ch
From: Julia Lawall <[EMAIL PROTECTED]>
The functions time_before, time_before_eq, time_after, and time_after_eq
are more robust for comparing jiffies against other values.
A simplified version of the semantic patch making this change is as follows:
(http://www.emn.fr/x-info/coccinelle/)
//
@ ch
From: Julia Lawall <[EMAIL PROTECTED]>
The functions time_before, time_before_eq, time_after, and time_after_eq
are more robust for comparing jiffies against other values.
A simplified version of the semantic patch making this change is as follows:
(http://www.emn.fr/x-info/coccinelle/)
//
@ ch
Rafael J. Wysocki wrote:
On Wednesday, 26 of December 2007, Linus Torvalds wrote:
On Tue, 25 Dec 2007, Rafael J. Wysocki wrote:
the ACPI specification between versions 1.0x and 2.0. Namely, while ACPI
2.0 and later wants us to put devices into low power states before calling
_PTS, ACPI
From: Julia Lawall <[EMAIL PROTECTED]>
The functions time_before, time_before_eq, time_after, and time_after_eq
are more robust for comparing jiffies against other values.
A simplified version of the semantic patch making this change is as follows:
(http://www.emn.fr/x-info/coccinelle/)
//
@ ch
On Tue, Dec 25, 2007 at 02:05:14PM -0800, Andrew Morton wrote:
> On Thu, 20 Dec 2007 01:48:49 +0100 Bartlomiej Zolnierkiewicz <[EMAIL
> PROTECTED]> wrote:
>
> > This patch series is a major rework of the ide-cd driver.
>
> woo-hoo.
>
> > PS ide-cd Maintainer position is still open...
>
> boo-h
From: Julia Lawall <[EMAIL PROTECTED]>
In the patch cc154ac64aa8d3396b187f64cef01ce67f433324, Al Viro observed
that the proper way to compute the distance between two structure fields is
to use offsetof() or a cast to a pointer to character. The same change can
be applied to a few more files.
Th
From: Julia Lawall <[EMAIL PROTECTED]>
In the patch cc154ac64aa8d3396b187f64cef01ce67f433324, Al Viro observed
that the proper way to compute the distance between two structure fields is
to use offsetof() or a cast to a pointer to character. The same change can
be applied to a few more files.
Th
From: Julia Lawall <[EMAIL PROTECTED]>
In the patch cc154ac64aa8d3396b187f64cef01ce67f433324, Al Viro observed
that the proper way to compute the distance between two structure fields is
to use offsetof() or a cast to a pointer to character. The same change can
be applied to a few more files.
Th
As James said I'm away right now and computer access is limited. However, I'm
stuck in the airport right now and spent some time looking at the code ...
Based on what has been found so far I wonder if the problem isn't a race but a
problem of skb->iif never being initialized correctly? To my u
On Wed, 26 Dec 2007 19:52:56 +1100, James Morris said:
> On Wed, 26 Dec 2007, [EMAIL PROTECTED] wrote:
>
> > On Wed, 26 Dec 2007 18:34:26 +1100, James Morris said:
> >
> > > Can you post your .config ?
> >
> > The gzip'ed config as of when I quit bisecting is attached. It's probably
> > not dir
On Wed, 26 Dec 2007 00:09:57 +0100
Pavel Machek <[EMAIL PROTECTED]> wrote:
> On Sat 2007-12-22 12:09:59, Arjan van de Ven wrote:
> > On Tue, 18 Dec 2007 17:06:24 +
> > memtest86+ does various magic to basically bypass the caches (by
> > disabling them ;-)... Doing that in a live kernel situat
Quoting Tetsuo Handa ([EMAIL PROTECTED]):
> This document is intended to specify the security goal that TOMOYO Linux is
> trying to achieve, so that users can evaluate whether TOMOYO Linux will meet
> their needs, and kernel developers can evaluate whether TOMOYO Linux deserved
> to be in-tree.
>
On Wed, 2007-12-26 at 17:36 +0900, Tejun Heo wrote:
> (PS, I haven't followed the sg chaining discussion. Why is sg chaining
> an optional feature? Performance overhead on low end machines?)
The idea of SG chaining is to allow drivers that wish to take advantage
of it to increase their transfer
On Sun, 2007-12-23 at 01:41 +0900, FUJITA Tomonori wrote:
> transport_container_unregister(&i->rport_attr_cont) should not fail here.
>
> It fails because there is still a srp rport.
>
> I think that as Pete pointed out, srp_remove_one needs to call
> srp_remove_host.
>
> Can you try this?
Tha
Am Mittwoch, 26. Dezember 2007 00:07:31 schrieb Pavel Machek:
> Heute 00:07:31
>
> This is RFC. It does not even work for me... it sleeps but it will not
> wake up, because SATA wakeup code is missing. Code attached for illustration.
>
> I wonder if this is the right approach? What is right in
Alexey Starikovskiy wrote:
I don't know.
Windows was compliant only with 1.x spec until Vista.
With Vista claims are 3.x compliance.
In other words, the 1.x spec is the only thing that matters, at least in
the short term (*noone* is giving up XP compatibility at this point.)
-h
Cyrill Gorcunov wrote:
It's a quite true, sorry for this and thanks for the note. And Peter,
the line I marked
is not to be splitted even having additional spaces over math operators. Look
orig:
mbr_base = (buf_base+sector_size-1) & ~(sector_size-1);
new (could be):
mbr_base = (buf_base + s
1 - 100 of 187 matches
Mail list logo