Hi,
I am working on MPC8360E Security Engine. I have ported the Openswan
2.4.5(IPSec --KLIPS) with OCF to MPC8360E's Security Engine (Talitos).
Encryption and Decryption is working. But when I check the performance of
Talitos with netio benchmark Tool, IPSec S/W Algorithms is giving more
On Thu, Dec 14, 2006 at 01:09:06PM -0800, Michael ODonald wrote:
> Linus Torvalds wrote:
> > DMCA is bad because it puts technical limits over
> > the rights expressly granted by copyright law.
>
> The best ways to get rich corporations on our side in fighting the
> DMCA is to use the DMCA to
Steven Rostedt <[EMAIL PROTECTED]> wrote:
> So you got a big jitter using nanosleep??? If that's the case, could
> you post the times you got. I'll also boot a kernel with the latest
> -rt patch, without highres compiled, and see if I can reproduce the
> same on x86.
You're very kind! Here you
I found a clever way to make the extra IOPL switching invisible to
non-paravirt compiles - since kernel_rpl is statically defined to
be zero there, and only non-zero rpl kernel have a problem restoring IOPL,
as popf does not restore IOPL flags unless run at CPL-0.
Subject: IOPL handling for
The VMI ROM has a mode where hypercalls can be queued and batched. This turns
out to be a significant win during context switch, but must be done at a
specific point before side effects to CPU state are visible to subsequent
instructions. This is similar to the MMU batching hooks already
Fairly straightforward implementation of VMI backend for paravirt-ops.
Subject: VMI backend for paravirt-ops
Signed-off-by: Zachary Amsden <[EMAIL PROTECTED]>
diff -r d8711b11c1eb arch/i386/Kconfig
--- a/arch/i386/Kconfig Tue Dec 12 13:51:06 2006 -0800
+++ b/arch/i386/Kconfig Tue Dec 12 13:51:13
The VMI backend uses explicit page type notification to track shadow
page tables. The allocation of page table roots is especially tricky.
We need to clone the root for non-PAE mode while it is protected under
the pgd lock to correctly copy the shadow.
We don't need to allocate pgds in PAE mode,
VMI timer code. It works by taking over the local APIC clock when APIC is
configured, which requires a couple hooks into the APIC code. The backend
timer code could be commonized into the timer infrastructure, but there are
some pieces missing (stolen time, in particular), and the exact
These are the patches for the VMI backend to paravirt-ops. Base
kernel where I tested them was 2.6.19-git20.
Basically, there are only a couple of hooks needed that were left
out of the initial paravirt-ops merge, and then the backend code
is a very straightforward implementation of the
Add VMI SMP boot hook. We emulate a regular boot sequence and use the
same APIC IPI initiation, we just poke magic values to load into the CPU
state when the startup IPI is received, rather than having to jump through a
real mode trampoline.
This is all that was needed to get SMP to work.
Chen, Kenneth wrote on Thursday, December 14, 2006 5:59 PM
> > It seems utterly insane to have aio_complete() flush a workqueue. That
> > function has to be called from a number of different environments,
> > including non-sleep tolerant environments.
> >
> > For instance it means that directIO
Temporarily at
http://userweb.kernel.org/~akpm/2.6.20-rc1-mm1/
Will appear later at
ftp://ftp.kernel.org/pub/linux/kernel/people/akpm/patches/2.6/2.6.20-rc1/2.6.20-rc1-mm1/
- Added the avr32 devel tree as git-avr32.patch (Haavard Skinnemoen)
- Don't enable locking API
Can some one explain why I see the below crash on Intel Xeon SMP box.
The kernel version is 2.6.11. This is what I'm trying to do in the
driver.
1.Submit a request to a device in 'unlocked_ioctl()' and issue
'wait_event_interruptible_timeout()' for 10 jiffies. There can be many
such outstanding
On Dec 14, 2006, "Jeff V. Merkey" <[EMAIL PROTECTED]> wrote:
> FREE implies a transfer of ownsership
It's about freedom, not price. And even then, it's the license that
has not cost, not the copyright.
> and you also have to contend with the Doctrine of Estoppel. i.e. if
> someone has been
On Wed, 13 Dec 2006 22:26:26 +0100
Eric Dumazet <[EMAIL PROTECTED]> wrote:
> This patch introduces a new structure called time_data, where some time
> keeping related variables are put together to share as few cache lines as
> possible.
ia64 refers to xtime_lock from assembly and hence doesn't
Nikolai Joukov wrote:
> > Nikolai Joukov wrote:
> > > We have designed a new stackable file system that we called RAIF:
> > > Redundant Array of Independent Filesystems.
> >
> > Great!
> >
> > > We have performed some benchmarking on a 3GHz PC with 2GB of RAM and
> > > U320 SCSI disks. Compared
Nikolai Joukov wrote:
> > > We started the project in April 2004. Right now I am using it as my
> > > /home/kolya file system at home. We believe that at this stage RAIF
> > > is mature enough for others to try it out. The code is available at:
> > >
> > >
On Wed, 6 Dec 2006 16:59:35 +
Andy Whitcroft <[EMAIL PROTECTED]> wrote:
> + tmp = __pfn_to_page(pfn);
ia64 doesn't implement __page_to_pfn. Why did you not use page_to_pfn()?
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a
On Dec 14, 2006, Greg KH <[EMAIL PROTECTED]> wrote:
> I think you missed the point that my patch prevents valid usages of
> non-GPL modules from happening, which is not acceptable.
What if you changed your patch so as to only permit loading of
possibly-infringing drivers after some flag in /proc
On Wed, 13 Dec 2006 10:59:11 +1100
NeilBrown <[EMAIL PROTECTED]> wrote:
> From: Chuck Lever <[EMAIL PROTECTED]>
> Expand the rq_addr field to allow it to contain larger addresses.
This patch breaks the NFS server on my heroically modern RH FC1 machine.
There's a mysterious 30-second pause when
On Thu, Dec 14, 2006 at 06:21:49PM +0900, Shinichiro HIDA wrote:
> Hi,
>
> ;; Sorry for late, and Thanks for following up.
>
> > In <[EMAIL PROTECTED]>
> > David Chinner <[EMAIL PROTECTED]> wrote:
> > On Wed, Dec 13, 2006 at 02:12:23PM +0900, Shinichiro HIDA wrote:
> > > Hi,
> > >
> >
Ingo,
I've hit this. I compiled the kernel as CONFIG_PREEMPT, and turned off
IRQ's as threads.
BUG: scheduling while atomic: swapper/0x0001/1, CPU#3
Call Trace:
[] dump_trace+0xaa/0x404
[] show_trace+0x3c/0x52
[] dump_stack+0x15/0x17
[] __sched_text_start+0x8a/0xbb7
[]
fix vm_events_fold_cpu() build breakage
2.6.20-rc1 does not build properly if CONFIG_VM_EVENT_COUNTERS is set
and CONFIG_HOTPLUG is unset:
CC init/version.o
LD init/built-in.o
LD .tmp_vmlinux1
mm/built-in.o: In function `page_alloc_cpu_notify':
page_alloc.c:(.text+0x56eb):
On Thursday 14 December 2006 12:48, Stefan Richter wrote:
[...]
>
>(Anyway, that's unrelated to Gene's issues.)
And which I haven't had a chance to check yet, the camera is still in the
truck and I've been busier than a one legged man in an ass kicking
contest today. I did get 2.6.20-rc1 built
Hello LKML,
I am observing processes entering uninterruptible sleep apparently due
to an unrelated application using mmap over nfs. Applications in
"uninterruptible sleep" hang indefinitely while other applications
continue working properly.
The code causing the mmap nfs hangs does the
Andrew Morton wrote on Thursday, December 14, 2006 5:20 PM
> it's hard to disagree.
>
> Begin forwarded message:
> > On Wed, 2006-12-13 at 08:25 +0100, xb wrote:
> > > Hi all,
> > >
> > > Running some IO stress tests on a 8*ways IA64 platform, we got:
> > > BUG: warning at
2.6.18-stable review patch. If anyone has any objections, please let us know.
--
From: David Miller <[EMAIL PROTECTED]>
Not returning -EINVAL, because someone might want to use the value
zero in some future gact_prob algorithm?
Signed-off-by: Kim Nordlund <[EMAIL PROTECTED]>
2.6.18-stable review patch. If anyone has any objections, please let us know.
--
From: David Miller <[EMAIL PROTECTED]>
Currently the behaviour of disable_xfrm is inconsistent between
locally generated and forwarded packets. For locally generated
packets disable_xfrm disables
2.6.18-stable review patch. If anyone has any objections, please let us know.
--
From: Zachary Amsden <[EMAIL PROTECTED]>
It is possible to have tasklets get scheduled before softirqd has had a chance
to spawn on all CPUs. This is totally harmless; after success during action
2.6.18-stable review patch. If anyone has any objections, please let us know.
--
From: Jeet Chaudhuri <[EMAIL PROTECTED]>
We must reserve SAR + MAX_HEADER bytes for IrLMP to fit in.
This fixes an oops reported (and fixed) by Jeet Chaudhuri, when max_sdu_size
is greater than 0.
Oops, sent a corrupt and old version of the patch. Here's
the correct patch.
While running a insmod/rmmod loop with the mptsas driver
(vanilla 2.6.19, IBM Intellistation Z30, SAS1064E controller
if it matters), I encountered a bad dereference of the
pointer "de":
spin_unlock(_subdir_lock);
if
2.6.18-stable review patch. If anyone has any objections, please let us know.
--
From: Patrick McHardy <[EMAIL PROTECTED]>
---
commit 79030ed07de673e8451a03aecb9ada9f4d75d491
tree 4ba8bd843c8bc95db0ea6877880b73d06da620e5
parent bec71b162747708d4b45b0cd399b484f52f2901a
author
2.6.18-stable review patch. If anyone has any objections, please let us know.
--
From: Al Viro <[EMAIL PROTECTED]>
No need to revisit a chain we'd already finished with during
the check for current hook. It's either instant loop (which
we'd just detected) or a duplicate work.
2.6.18-stable review patch. If anyone has any objections, please let us know.
--
From: Al Viro <[EMAIL PROTECTED]>
---
net/bridge/netfilter/ebtables.c | 17 +
1 file changed, 9 insertions(+), 8 deletions(-)
---
2.6.18-stable review patch. If anyone has any objections, please let us know.
--
From: Patrick McHardy <[EMAIL PROTECTED]>
The tc actions increased the size of struct tc_police, which broke
compatibility with old iproute binaries since both the act_police
and the old
2.6.18-stable review patch. If anyone has any objections, please let us know.
--
From: Andrey Mirkin <[EMAIL PROTECTED]>
OpenVZ Linux kernel team has found a problem with mounting in compat mode.
Simple command "mount -t smbfs ..." on Fedora Core 5 distro in 32-bit mode
leads
2.6.18-stable review patch. If anyone has any objections, please let us know.
--
From: Stefan Richter <[EMAIL PROTECTED]>
Fixes http://bugzilla.kernel.org/show_bug.cgi?id=7431
iBook G3 threw a machine check exception and put the display backlight
to full brightness after
2.6.18-stable review patch. If anyone has any objections, please let us know.
--
From: Al Viro <[EMAIL PROTECTED]>
We need that for iterator to work; existing check had been too weak.
Signed-off-by: Al Viro <[EMAIL PROTECTED]>
Signed-off-by: David S. Miller <[EMAIL PROTECTED]>
2.6.18-stable review patch. If anyone has any objections, please let us know.
--
From: Daniel Barkalow <[EMAIL PROTECTED]>
At least some nforce cards continue to send legacy interrupts when MSI
is enabled, and these interrupts are treated as unhandled by the
kernel. This patch
2.6.18-stable review patch. If anyone has any objections, please let us know.
--
From: Marcel Holtmann <[EMAIL PROTECTED]>
With malformed packets it might be possible to overwrite internal
CMTP and CAPI data structures. This patch adds additional length
checks to prevent these
2.6.18-stable review patch. If anyone has any objections, please let us know.
--
From: Al Viro <[EMAIL PROTECTED]>
We need to verify that
a) we are not too close to the end of buffer to dereference
b) next entry we'll be checking won't be _before_ our
While we
2.6.18-stable review patch. If anyone has any objections, please let us know.
--
From: Hans Verkuil <[EMAIL PROTECTED]>
The TUNER_LG_NTSC_TAPE is identical in all respects to the
TUNER_PHILIPS_FM1236_MK3. So use the params struct for the Philips tuner.
Also add this LG_NTSC_TAPE
2.6.18-stable review patch. If anyone has any objections, please let us know.
--
From: Michael Krufky <[EMAIL PROTECTED]>
In some cases when using VSB, the AGC status register has been known to
falsely report "no signal" when in fact there is a carrier lock. The
datasheet
2.6.18-stable review patch. If anyone has any objections, please let us know.
--
From: Russell King <[EMAIL PROTECTED]>
Later glibc requires the *at syscalls. Add them.
Signed-off-by: Russell King <[EMAIL PROTECTED]>
Signed-off-by: Chris Wright <[EMAIL PROTECTED]>
---
On Friday 15 December 2006 00:48, Alistair John Strachan wrote:
> On Thursday 14 December 2006 21:20, Jens Axboe wrote:
> > On Thu, Dec 14 2006, Alistair John Strachan wrote:
> > > Hi Jens,
> > >
> > > On Thursday 14 December 2006 20:48, Jens Axboe wrote:
> > > > On Thu, Dec 14 2006, Jens Axboe
2.6.18-stable review patch. If anyone has any objections, please let us know.
--
From: Hirokazu Takata <[EMAIL PROTECTED]>
The m32r kernel 2.6.18-rc1 or after cause build errors of "unknown isa
configuration" for userspace application programs, such as glibc, gdb, etc.
This is
2.6.18-stable review patch. If anyone has any objections, please let us know.
--
From: David Miller <[EMAIL PROTECTED]>
We grab a reference to the route's inetpeer entry but
forget to release it in xfrm4_dst_destroy().
Bug discovered by Kazunori MIYAZAWA <[EMAIL PROTECTED]>
2.6.18-stable review patch. If anyone has any objections, please let us know.
--
From: Andy Gospodarek <[EMAIL PROTECTED]>
This is a small fix-up to finish out the work done by Jay Vosburgh to
add carrier-state support for bonding devices. The output in
/proc/net/bonding/bondX
2.6.18-stable review patch. If anyone has any objections, please let us know.
--
From: Christophe Saout <[EMAIL PROTECTED]>
Fix corruption issue with dm-crypt on top of software raid5. Cancelled
readahead bio's that report no error, just have BIO_UPTODATE cleared
were reported
2.6.18-stable review patch. If anyone has any objections, please let us know.
--
From: Milan Broz <[EMAIL PROTECTED]>
Fix oops when removing full snapshot
kernel bugzilla bug 7040
If a snapshot became invalid (full) while there is outstanding
pending_exception,
This is the start of the stable review cycle for the 2.6.18.6 release.
There are 24 patches in this series, all will be posted as a response
to this one. If anyone has any issues with these being applied, please
let us know. If anyone is a maintainer of the proper subsystem, and
wants to add a
2.6.18-stable review patch. If anyone has any objections, please let us know.
--
From: Michael Buesch <[EMAIL PROTECTED]>
In the scan section of ieee80211softmac, network transmits are disabled.
When SoftMAC re-enables transmits, it may override the wishes of a driver
that may
2.6.18-stable review patch. If anyone has any objections, please let us know.
--
From: Jurij Smakov <[EMAIL PROTECTED]>
The following patch fixes the failure of sunhme drivers on x86 hosts
due to missing pci_enable_device() and pci_set_master() calls, lost
during code
patch roll-up is available at:
http://www.kernel.org/pub/linux/kernel/people/chrisw/stable/patch-2.6.18.6-rc1.{gz,bz2}
once mirroring has completed.
thanks,
-chris
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
On 12/14/06, Randy Dunlap <[EMAIL PROTECTED]> wrote:
> - (void) do_syslog(0,NULL,0);
> + (void) do_syslog(KLOG_CLOSE,NULL,0);
Please use a space after the commas (even though you just left it
as it already was).
Will change for the next revision.
zw
-
To unsubscribe from this list:
On 12/14/06, Randy Dunlap <[EMAIL PROTECTED]> wrote:
> +#define security_syslog_or_fail(type) do { \
> + int error = security_syslog(type); \
> + if (error) \
> + return error; \
> + }
> Well, Congratulations, Doctor!! [Must be nice to be exiled to Stony
> Brook!! Oh, well, not I]
Long Island is a very nice place with lots of vineries and perfect sand
beaches - don't envy :-)
> Here's hoping that source exists, and that it is available for us.
I guess, you are subscribed to
Hi all,
I am working on a ARM based SOV and i am tryig to add glue logic for
EHCI controller.
But i am facing some problem.
I want to know ,are there any known problem in 2.6.15?
Thanks
Ashwini
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to
Alistair John Strachan wrote:
I bisected all the way down to 0e75f9063f5c55fb0b0b546a7c356f8ec186825e, which
git reckons is the culprit. I wasn't able to revert this commit to test,
because it has conflicts.
Any ideas?
That would be this one I assume?
[PATCH] block: support larger block pc
>
> +config PATA_IT8213
> + tristate "IT8213 PATA support (Experimental)"
> + depends on PCI && EXPERIMENTAL
> + help
> + This option enables support for the ITE 821 PATA
Typo (IT8213) - probably my fault but only just noticed it
-
To unsubscribe from this list: send the
On Thu, 14 Dec 2006 16:16:41 -0800 Zack Weinberg wrote:
> As suggested by Stephen Smalley: map the various sys_syslog operations
> to a smaller set of privilege codes before calling security modules.
> This patch changes the security module interface! There should be no
> change in the actual
Hi,
While running a insmod/rmmod loop with the mptsas driver (vanilla
2.6.19, IBM Intellistation Z30, SAS1064E controller if it matters),
I encountered the following messages from the kernel:
[53092.441412] general protection fault: [1] PREEMPT SMP
[53092.447058] CPU 4
[53092.449108]
On Thu, Dec 14, 2006 at 04:16:39PM -0600, Miller, Mike (OS Dev) wrote:
> H. Dann, did you see this on 32-bit Debian?
yep - all reports I've seen so far are on i386
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More
> The best ways to get rich corporations on our side in fighting the
> DMCA is to use the DMCA to hurt their profits. Companies that rely on
> binary drivers would have several options:
>
> 1) Lobby politicians to repeal the DMCA,
They already are. The tech industry is mostly anti DMCA and
On Thu, 14 Dec 2006 16:16:40 -0800 Zack Weinberg wrote:
> This patch introduces with symbolic constants for the
> various sys_syslog() opcodes, and changes all in-kernel references to
> those opcodes to use the constants. The header is added to the set of
> user/kernel interface headers.
Andrew Morton <[EMAIL PROTECTED]> writes:
> Guys, we have about 100 reports of weirdo
> crashes, smashes, bashes and splats in the kref code. The last thing we
> need is some obscure, tricksy little optimisation which leads legitimate
> uses of the API to mysteriously
> Thanks for clarifying Bill, and sorry Alan. ata_piix does indeed work
> correctly. The help text is a bit confusing:
The help text is out of date - thanks that is a real bug
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
Michael Bommarito wrote:
Hello Uli,
Yes, apologies, I had been waiting for an abandoned bugzilla entry
to get attention, and when I realized it was assigned to a dead-end, I
had simply posted the patch without checking for prior messages.
I was further confused by the fact that it hadn't made
This patch introduces with symbolic constants for the
various sys_syslog() opcodes, and changes all in-kernel references to
those opcodes to use the constants. The header is added to the set of
user/kernel interface headers. (Unlike the previous revision of this
patch series, no kernel-private
Here's a re-revised version of my patch set to allow klogd to drop
privileges and continue reading from /proc/kmsg (currently, even if klogd
has a legitimately opened fd on /proc/kmsg, it cannot read from it unless
it has CAP_SYS_ADMIN asserted). SELinux's pickier and finer-grained
privilege
As suggested by Stephen Smalley: map the various sys_syslog operations
to a smaller set of privilege codes before calling security modules.
This patch changes the security module interface! There should be no
change in the actual security semantics enforced by dummy, capability,
nor SELinux (with
This patch breaks out the read operations in do_syslog() into their
own functions (klog_read, klog_readhist) and adds a klog_poll.
klog_read grows the ability to do a nonblocking read, which I expose
in the sys_syslog interface because there doesn't seem to be any
reason not to. do_syslog itself
On Thu, 14 Dec 2006, Randy Dunlap wrote:
> On Thu, 14 Dec 2006 19:07:27 -0500 (EST) Robert P. J. Day wrote:
>
> > On Thu, 14 Dec 2006, Randy Dunlap wrote:
> >
> > > David Weinehall wrote:
> > > > On Thu, Dec 07, 2006 at 12:48:38AM -0800, Randy Dunlap wrote:
> > > >
> > > > [snip]
> > > >
> > > >
Finally, add a new security class for access to /proc/kmsg, distinct
from the class used for the "read current messages" operations on
sys_syslog. The dummy and capability modules permit access to
/proc/kmsg to any user (who has somehow acquired an open fd on it);
SELinux is unchanged. This
On Thursday 14 December 2006 21:20, Jens Axboe wrote:
> On Thu, Dec 14 2006, Alistair John Strachan wrote:
> > Hi Jens,
> >
> > On Thursday 14 December 2006 20:48, Jens Axboe wrote:
> > > On Thu, Dec 14 2006, Jens Axboe wrote:
> > > > > I'll do that if nobody comes up with anything obvious.
> > >
On Thu, Dec 14, 2006 at 07:36:35PM -0500, Doug Ledford wrote:
> On Fri, 2006-12-15 at 01:19 +0100, Adrian Bunk wrote:
> > While looking at commit 8ddeeae51f2f197b4fafcba117ee8191b49d843e,
> > I got the impression that this commit couldn't fix anything, since the
> > "size" variable can't be
On Thu, 14 Dec 2006 17:19:55 -0700
[EMAIL PROTECTED] (Eric W. Biederman) wrote:
> "Pallipadi, Venkatesh" <[EMAIL PROTECTED]> writes:
>
> >>But I believe Venkatesh problem comes from its release()
> >>function : It is
> >>supposed to free the object.
> >>If not, it should properly setup it so
On Thu, 14 Dec 2006 18:32:50 +
Alistair John Strachan <[EMAIL PROTECTED]> wrote:
> Correct me if I'm wrong, but SATA wasn't available on ICH4. Only 5 and
> greater. The kernel help text agrees with me.
>
> My IDE controller usually works with CONFIG_BLK_DEV_PIIX; I was interested in
> using
On Fri, 2006-12-15 at 01:19 +0100, Adrian Bunk wrote:
> While looking at commit 8ddeeae51f2f197b4fafcba117ee8191b49d843e,
> I got the impression that this commit couldn't fix anything, since the
> "size" variable can't be changed before "fit" gets used.
>
> Is there any big thinko, or is the
Make the semaphore undo code use a task watcher instead of hooking into
copy_process() and do_exit() directly.
Signed-off-by: Matt Helsley <[EMAIL PROTECTED]>
---
include/linux/sem.h | 17 -
ipc/sem.c | 12
kernel/exit.c |2 --
kernel/fork.c
Register a task watcher for cpusets instead of hooking into
copy_process() and do_exit() directly.
Signed-off-by: Matt Helsley <[EMAIL PROTECTED]>
Cc: Paul Jackson <[EMAIL PROTECTED]>
---
include/linux/cpuset.h |4
kernel/cpuset.c| 11 +--
kernel/exit.c |2
On Thu, 14 Dec 2006 19:07:27 -0500 (EST) Robert P. J. Day wrote:
> On Thu, 14 Dec 2006, Randy Dunlap wrote:
>
> > David Weinehall wrote:
> > > On Thu, Dec 07, 2006 at 12:48:38AM -0800, Randy Dunlap wrote:
> > >
> > > [snip]
> > >
> > > > +but no space after unary operators:
> > > > +
Register a NUMA mempolicy task watcher instead of hooking into
copy_process() and do_exit() directly.
Signed-off-by: Matt Helsley <[EMAIL PROTECTED]>
---
kernel/exit.c |4
kernel/fork.c | 15 +--
mm/mempolicy.c | 25 +
3 files changed, 26
Register a task watcher for lockdep instead of hooking into copy_process().
Signed-off-by: Matt Helsley <[EMAIL PROTECTED]>
---
kernel/fork.c|5 -
kernel/lockdep.c | 11 +++
2 files changed, 11 insertions(+), 5 deletions(-)
Index: linux-2.6.19/kernel/fork.c
Make the Process events connector use task watchers instead of hooking the
paths it's interested in.
Signed-off-by: Matt Helsley <[EMAIL PROTECTED]>
---
drivers/connector/cn_proc.c | 51 +++-
fs/exec.c |1
include/linux/cn_proc.h
Register an irq-flag-tracing task watcher instead of hooking into
copy_process().
Signed-off-by: Matt Helsley <[EMAIL PROTECTED]>
---
kernel/fork.c | 19 ---
kernel/irq/handle.c | 24
2 files changed, 24 insertions(+), 19 deletions(-)
Index:
Change audit to register a task watcher function rather than modify
the copy_process() and do_exit() paths directly.
Removes an unlikely() hint from kernel/exit.c:
if (unlikely(tsk->audit_context))
audit_free(tsk);
This use of unlikely() is an artifact of audit_free()'s
Prefetch the entire array of function pointers.
Signed-off-by: Matt Helsley <[EMAIL PROTECTED]>
---
kernel/task_watchers.c |2 ++
1 file changed, 2 insertions(+)
Index: linux-2.6.19/kernel/task_watchers.c
===
---
Make the keyring code use a task watcher to initialize and free per-task data.
NOTE:
We can't make copy_thread_group_keys() in copy_signal() a task watcher because
it needs the task's signal field (struct signal_struct).
Signed-off-by: Matt Helsley <[EMAIL PROTECTED]>
Cc: David Howells <[EMAIL
This is version 2 of my Task Watchers patches with performance enhancements.
Task watchers calls functions whenever a task forks, execs, changes its
[re][ug]id, or exits.
Task watchers is primarily useful to existing kernel code as a means of making
the code in fork and exit more readable.
Associate function calls with significant events in a task's lifetime much like
we handle kernel and module init/exit functions. This creates a table for each
of the following events in the task_watchers_table ELF section:
WATCH_TASK_INIT at the beginning of a fork/clone system call when the
new
"Pallipadi, Venkatesh" <[EMAIL PROTECTED]> writes:
>>But I believe Venkatesh problem comes from its release()
>>function : It is
>>supposed to free the object.
>>If not, it should properly setup it so that further uses are OK.
>>
>>ie doing in release(kref)
>>atomic_set(>count, 0);
>>
>
>
On Fri, 15 Dec 2006, Miguel Ojeda wrote:
> On 12/13/06, Robert P. J. Day <[EMAIL PROTECTED]> wrote:
> >
> > there are numerous places throughout the source tree that apparently
> > calculate the size of an array using the construct
> > "sizeof(fubar)/sizeof(fubar[0])". see for yourself:
> >
> >
From: Eric Anholt <[EMAIL PROTECTED]>
On the G965, the GTT size may be larger than is required to cover the aperture.
(In fact, on all hardware we've seen, the GTT is 512KB to the aperture's
256MB). A previous commit forced the aperture size to 512MB on G965 to match
GTT, which would likely
While looking at commit 8ddeeae51f2f197b4fafcba117ee8191b49d843e,
I got the impression that this commit couldn't fix anything, since the
"size" variable can't be changed before "fit" gets used.
Is there any big thinko, or is the patch below that slightly simplifies
update_size() semantically
On Sat, 2006-12-02 at 01:56 +0100, Christoph Anton Mitterer wrote:
> Hi.
>
> Perhaps some of you have read my older two threads:
> http://marc.theaimsgroup.com/?t=11631244001=1=2 and the even
> older http://marc.theaimsgroup.com/?t=11629131451=1=2
>
> The issue was basically the
On Thu, 14 Dec 2006, Randy Dunlap wrote:
> David Weinehall wrote:
> > On Thu, Dec 07, 2006 at 12:48:38AM -0800, Randy Dunlap wrote:
> >
> > [snip]
> >
> > > +but no space after unary operators:
> > > + sizeof ++ -- & * + - ~ ! defined
> >
> > Uhm, that doesn't compute... If you
On Thu, Dec 14, 2006 at 06:35:30PM -0500, Daniel Drake wrote:
> So, you think that the aperture moving to a different location on every
> boot is what the BIOS desires? Is it normal for it to move so much?
Beats me. I gave up trying to understand BIOS authors motivations years ago.
> The
On 12/14/06, Randy Dunlap <[EMAIL PROTECTED]> wrote:
Scott Preece wrote:
[1]
>> Outside of comments, documentation and except in Kconfig, spaces are
>> never
>> used for indentation, and the above example is deliberately broken.
> ---
>
> I realize it isn't text you added, but what's that
Le jeudi 14 décembre 2006 à 18:22 -0500, Jeff Garzik a écrit :
> Nicolas Mailhot wrote:
> > Alistair John Strachan sms.ed.ac.uk> writes:
> >
> >> `hddtemp' has stopped working on 2.6.20-rc1:
> >
> > → http://bugzilla.kernel.org/show_bug.cgi?id=7581
>
> I'm not sure I quite follow your bug
1 - 100 of 871 matches
Mail list logo