Re: console font limits

2007-05-01 Thread Albert Cahalan
On 5/1/07, H. Peter Anvin <[EMAIL PROTECTED]> wrote: Antonino A. Daplas wrote: > > And this will entail a lot of work to change (Is it worth it to rework > the code and remove the limitation?). The linux-console project > (http://linuxconsole.sourceforge.net/) might have , but I don't know its >

Re: console font limits

2007-05-01 Thread Albert Cahalan
On 5/1/07, H. Peter Anvin [EMAIL PROTECTED] wrote: Antonino A. Daplas wrote: And this will entail a lot of work to change (Is it worth it to rework the code and remove the limitation?). The linux-console project (http://linuxconsole.sourceforge.net/) might have , but I don't know its

console font limits

2007-04-30 Thread Albert Cahalan
I'm having problems with a font I just created. It's a rather big one, intended for a framebuffer console in UTF-8 mode. The strace program reports that /bin/setfont fails on a KDFONTOP ioctl with EINVAL. In reading the kernel code, I find this: vt.c:static int con_font_set(struct vc_data *vc,

console font limits

2007-04-30 Thread Albert Cahalan
I'm having problems with a font I just created. It's a rather big one, intended for a framebuffer console in UTF-8 mode. The strace program reports that /bin/setfont fails on a KDFONTOP ioctl with EINVAL. In reading the kernel code, I find this: vt.c:static int con_font_set(struct vc_data *vc,

Re: [PATCH] Only send pdeath_signal when getppid changes.

2007-04-10 Thread Albert Cahalan
's useful, but the other case is more important. > Does a parent death signal make most sense between processes that are part of > a larger program. That is the only way I can really see it being used. The only actual example of use I know is what Albert Cahalan reported. To my mind, the

Re: [PATCH] Only send pdeath_signal when getppid changes.

2007-04-10 Thread Albert Cahalan
, but the other case is more important. Does a parent death signal make most sense between processes that are part of a larger program. That is the only way I can really see it being used. The only actual example of use I know is what Albert Cahalan reported. To my mind, the only semantics that matter

Re: PID entries in /proc sorted by number, not start time in 2.6.19

2007-02-28 Thread Albert Cahalan
On 2/28/07, Eric W. Biederman <[EMAIL PROTECTED]> wrote: Chuck Ebbert <[EMAIL PROTECTED]> writes: > Starting with kernel 2.6.19, the process directories in > /proc are sorted by number. They were sorted by process > start time in 2.6.18 and earlier. This makes the output > of procps come out in

Re: PID entries in /proc sorted by number, not start time in 2.6.19

2007-02-28 Thread Albert Cahalan
On 2/28/07, Eric W. Biederman [EMAIL PROTECTED] wrote: Chuck Ebbert [EMAIL PROTECTED] writes: Starting with kernel 2.6.19, the process directories in /proc are sorted by number. They were sorted by process start time in 2.6.18 and earlier. This makes the output of procps come out in that

Re: kernel + gcc 4.1 = several problems

2007-01-04 Thread Albert Cahalan
On 1/4/07, Segher Boessenkool <[EMAIL PROTECTED]> wrote: > Adjusting gcc flags to eliminate optimizations is another way to go. > Adding -fwrapv would be an excellent start. Lack of this flag breaks > most code which checks for integer wrap-around. Lack of the flag does not break any valid C

Re: kernel + gcc 4.1 = several problems

2007-01-04 Thread Albert Cahalan
On 1/4/07, Segher Boessenkool [EMAIL PROTECTED] wrote: Adjusting gcc flags to eliminate optimizations is another way to go. Adding -fwrapv would be an excellent start. Lack of this flag breaks most code which checks for integer wrap-around. Lack of the flag does not break any valid C code,

Re: kernel + gcc 4.1 = several problems

2007-01-03 Thread Albert Cahalan
Linus Torvalds writes: [probably Mikael Pettersson] writes: The suggestions I've had so far which I have not yet tried: - Select a different x86 CPU in the config. - Unfortunately the C3-2 flags seem to simply tell GCC to schedule for ppro (like i686) and enabled MMX and SSE -

nasty thread-related bugs, maybe in exit

2006-12-20 Thread Albert Cahalan
There are big nasty bugs related to threaded processes exiting, especially when involving: zombie leaders, clone w/o SIGCHLD, and ptrace. I can make tasks that remain until reboot. I've seen things stuck in "X" state. I've seen pending SIGKILL and even blocked SIGKILL. I've seen "D" state

Re: [BUG] daemon.c blows up on OSX

2006-12-20 Thread Albert Cahalan
Linus Torvalds writes: So it would appear that for OS X, the #define _XOPEN_SOURCE_EXTENDED 1 /* AIX 5.3L needs this */ #define _GNU_SOURCE #define _BSD_SOURCE sequence actually _disables_ those things. Yes, of course. The odd one here is glibc. Normal systems enable

Re: [PATCH] procfs: export context switch counts in /proc/*/stat

2006-12-20 Thread Albert Cahalan
On 12/20/06, David Wragg <[EMAIL PROTECTED]> wrote: "Albert Cahalan" <[EMAIL PROTECTED]> writes: > On Mon, Dec 18, 2006 at 11:50:08PM +, David Wragg wrote: >> This patch (against 2.6.19/2.6.19.1) adds the four context >> switch values (voluntary con

Re: util-linux: orphan

2006-12-20 Thread Albert Cahalan
On 12/20/06, Jan Engelhardt <[EMAIL PROTECTED]> wrote: >> I've originally thought about util-linux upstream fork, >> but as usually an fork is bad step. So.. I'd like to start >> some discussion before this step. > ... >> after few weeks I'm pleased to announce a new "util-linux-ng" >> project.

Re: util-linux: orphan

2006-12-20 Thread Albert Cahalan
On 12/20/06, Jan Engelhardt [EMAIL PROTECTED] wrote: I've originally thought about util-linux upstream fork, but as usually an fork is bad step. So.. I'd like to start some discussion before this step. ... after few weeks I'm pleased to announce a new util-linux-ng project. This project

Re: [PATCH] procfs: export context switch counts in /proc/*/stat

2006-12-20 Thread Albert Cahalan
On 12/20/06, David Wragg [EMAIL PROTECTED] wrote: Albert Cahalan [EMAIL PROTECTED] writes: On Mon, Dec 18, 2006 at 11:50:08PM +, David Wragg wrote: This patch (against 2.6.19/2.6.19.1) adds the four context switch values (voluntary context switches, involuntary context switches

Re: [BUG] daemon.c blows up on OSX

2006-12-20 Thread Albert Cahalan
Linus Torvalds writes: So it would appear that for OS X, the #define _XOPEN_SOURCE_EXTENDED 1 /* AIX 5.3L needs this */ #define _GNU_SOURCE #define _BSD_SOURCE sequence actually _disables_ those things. Yes, of course. The odd one here is glibc. Normal systems enable

nasty thread-related bugs, maybe in exit

2006-12-20 Thread Albert Cahalan
There are big nasty bugs related to threaded processes exiting, especially when involving: zombie leaders, clone w/o SIGCHLD, and ptrace. I can make tasks that remain until reboot. I've seen things stuck in X state. I've seen pending SIGKILL and even blocked SIGKILL. I've seen D state pretending

Re: util-linux: orphan

2006-12-19 Thread Albert Cahalan
Karel Zak writes: I've originally thought about util-linux upstream fork, but as usually an fork is bad step. So.. I'd like to start some discussion before this step. ... after few weeks I'm pleased to announce a new "util-linux-ng" project. This project is a fork of the original util-linux

Re: BUG: wedged processes, test program supplied

2006-12-19 Thread Albert Cahalan
On 12/20/06, Mike Galbraith <[EMAIL PROTECTED]> wrote: On Tue, 2006-12-19 at 21:46 -0500, Albert Cahalan wrote: > Somebody PLEASE try this... I was having enough fun with cloninator (which was whitespace munged btw). Anything stuck? Besides refusing to die, that beast slays debug

Re: [PATCH] procfs: export context switch counts in /proc/*/stat

2006-12-19 Thread Albert Cahalan
David Wragg writes: Benjamin LaHaise <[EMAIL PROTECTED]> writes: On Mon, Dec 18, 2006 at 11:50:08PM +, David Wragg wrote: This patch (against 2.6.19/2.6.19.1) adds the four context switch values (voluntary context switches, involuntary context switches, and the same values accumulated

BUG: wedged processes, test program supplied

2006-12-19 Thread Albert Cahalan
Somebody PLEASE try this... Normally, when a process dies it becomes a zombie. If the parent dies (before or after the child), the child is adopted by init. Init will reap the child. The program included below DOES NOT get reaped. Do like so: gcc -m32 -O2 -std=gnu99 -o foo foo.c while true;

BUG: wedged processes, test program supplied

2006-12-19 Thread Albert Cahalan
Somebody PLEASE try this... Normally, when a process dies it becomes a zombie. If the parent dies (before or after the child), the child is adopted by init. Init will reap the child. The program included below DOES NOT get reaped. Do like so: gcc -m32 -O2 -std=gnu99 -o foo foo.c while true;

Re: [PATCH] procfs: export context switch counts in /proc/*/stat

2006-12-19 Thread Albert Cahalan
David Wragg writes: Benjamin LaHaise [EMAIL PROTECTED] writes: On Mon, Dec 18, 2006 at 11:50:08PM +, David Wragg wrote: This patch (against 2.6.19/2.6.19.1) adds the four context switch values (voluntary context switches, involuntary context switches, and the same values accumulated from

Re: BUG: wedged processes, test program supplied

2006-12-19 Thread Albert Cahalan
On 12/20/06, Mike Galbraith [EMAIL PROTECTED] wrote: On Tue, 2006-12-19 at 21:46 -0500, Albert Cahalan wrote: Somebody PLEASE try this... I was having enough fun with cloninator (which was whitespace munged btw). Anything stuck? Besides refusing to die, that beast slays debuggers left

Re: util-linux: orphan

2006-12-19 Thread Albert Cahalan
Karel Zak writes: I've originally thought about util-linux upstream fork, but as usually an fork is bad step. So.. I'd like to start some discussion before this step. ... after few weeks I'm pleased to announce a new util-linux-ng project. This project is a fork of the original util-linux

unreapable zombies, maybe futex+ptrace+exit

2006-12-18 Thread Albert Cahalan
I have a fun little test program for people to try. It creates zombies that persist until reboot, despite being reparented to init. Sometimes it creates processes that block SIGKILL, sit around with pending SIGKILL, or both. You'll want: a. either assembly skills or the ability to run 32-bit

unreapable zombies, maybe futex+ptrace+exit

2006-12-18 Thread Albert Cahalan
I have a fun little test program for people to try. It creates zombies that persist until reboot, despite being reparented to init. Sometimes it creates processes that block SIGKILL, sit around with pending SIGKILL, or both. You'll want: a. either assembly skills or the ability to run 32-bit

Re: new procfs memory analysis feature

2006-12-11 Thread Albert Cahalan
David Singleton writes: Add variation of /proc/PID/smaps called /proc/PID/pagemaps. Shows reference counts for individual pages instead of aggregate totals. Allows more detailed memory usage information for memory analysis tools. An example of the output shows the shared text VMA for ld.so and

Re: new procfs memory analysis feature

2006-12-11 Thread Albert Cahalan
David Singleton writes: Add variation of /proc/PID/smaps called /proc/PID/pagemaps. Shows reference counts for individual pages instead of aggregate totals. Allows more detailed memory usage information for memory analysis tools. An example of the output shows the shared text VMA for ld.so and

Re: [RFC][PATCH] Simple privacy enhancement for /proc/

2005-04-12 Thread Albert Cahalan
On Sun, 2005-04-10 at 17:38 +0200, Rene Scharfe wrote: > Albert, allowing access based on tty sounds nice, but it _is_ expansive. > More importantly, perhaps, it would "virtualize" /proc: every user would > see different permissions for certain files in there. That's too comlex > for my taste.

Re: [RFC][PATCH] Simple privacy enhancement for /proc/pid

2005-04-12 Thread Albert Cahalan
On Sun, 2005-04-10 at 17:38 +0200, Rene Scharfe wrote: Albert, allowing access based on tty sounds nice, but it _is_ expansive. More importantly, perhaps, it would virtualize /proc: every user would see different permissions for certain files in there. That's too comlex for my taste. If you

Re: Kernel SCM saga..

2005-04-09 Thread Albert Cahalan
Linus Torvalds writes: > NOTE! I detest the centralized SCM model, but if push comes to shove, > and we just _can't_ get a reasonable parallell merge thing going in > the short timeframe (ie month or two), I'll use something like SVN > on a trusted site with just a few committers, and at least

Re: Kernel SCM saga..

2005-04-09 Thread Albert Cahalan
Linus Torvalds writes: NOTE! I detest the centralized SCM model, but if push comes to shove, and we just _can't_ get a reasonable parallell merge thing going in the short timeframe (ie month or two), I'll use something like SVN on a trusted site with just a few committers, and at least try to

Re: Can't use SYSFS for "Proprietry" driver modules !!!.

2005-03-27 Thread Albert Cahalan
greg k-h writes: > On Sat, Mar 26, 2005 at 10:30:20PM -0500, Lee Revell wrote: >> That's the problem, it's not spelled out explicitly anywhere. >> That file does not address the issue of whether a driver is >> a "derived work". This is the part he should talk to a lawyer >> about, right? > > How

Re: Can't use SYSFS for Proprietry driver modules !!!.

2005-03-27 Thread Albert Cahalan
greg k-h writes: On Sat, Mar 26, 2005 at 10:30:20PM -0500, Lee Revell wrote: That's the problem, it's not spelled out explicitly anywhere. That file does not address the issue of whether a driver is a derived work. This is the part he should talk to a lawyer about, right? How about the

Re: [PATCH][0/6] Change proc file permissions with sysctls

2005-03-19 Thread Albert Cahalan
On Sun, 2005-03-20 at 01:22 +0100, Rene Scharfe wrote: > The permissions of files in /proc/1 (usually belonging to init) are > kept as they are. The idea is to let system processes be freely > visible by anyone, just as before. Especially interesting in this > regard would be instances of

Re: [PATCH][0/6] Change proc file permissions with sysctls

2005-03-19 Thread Albert Cahalan
On Sun, 2005-03-20 at 01:22 +0100, Rene Scharfe wrote: The permissions of files in /proc/1 (usually belonging to init) are kept as they are. The idea is to let system processes be freely visible by anyone, just as before. Especially interesting in this regard would be instances of login. I

Re: [RFC][PATCH] new timeofday core subsystem (v. A3)

2005-03-17 Thread Albert Cahalan
On Thu, 2005-03-17 at 16:55 +, Russell King wrote: > On Tue, Mar 15, 2005 at 10:23:54AM -0500, Albert Cahalan wrote: > > On Mon, 2005-03-14 at 19:22 -0800, Christoph Lameter wrote: > > > On Mon, 14 Mar 2005, Albert Cahalan wrote: > > > > > > > When the

Re: [RFC][PATCH] new timeofday core subsystem (v. A3)

2005-03-17 Thread Albert Cahalan
On Thu, 2005-03-17 at 16:55 +, Russell King wrote: On Tue, Mar 15, 2005 at 10:23:54AM -0500, Albert Cahalan wrote: On Mon, 2005-03-14 at 19:22 -0800, Christoph Lameter wrote: On Mon, 14 Mar 2005, Albert Cahalan wrote: When the vsyscall page is created, copy the one needed

Re: [PATCH][RFC] /proc umask and gid [was: Make /proc/ chmod'able]

2005-03-15 Thread Albert Cahalan
Better interface: /sbin/sysctl -w proc.maps=0440 /sbin/sysctl -w proc.cmdline=0444 /sbin/sysctl -w proc.status=0444 The /etc/sysctl.conf file can be used to set these at boot time. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL

Re: [PATCH][RFC] /proc umask and gid [was: Make /proc/ chmod'able]

2005-03-15 Thread Albert Cahalan
On Wed, 2005-03-16 at 03:39 +0100, Rene Scharfe wrote: > So, I gather from the feedback I've got that chmod'able /proc/ > would be a bit over the top. 8-) While providing the easiest and most > intuitive user interface for changing the permissions on those > directories, it is overkill. Paul is

Re: Capabilities across execve

2005-03-15 Thread Albert Cahalan
Russell King, the latest person to notice defects, writes: > However, the way the kernel is setup today, this seems > impossible to achieve, which tends to make the whole > idea of capabilities completely and utterly useless. > > How is this stuff supposed to work? Are my ideas of > what's

Re: [PATCH][RFC] Make /proc/ chmod'able

2005-03-15 Thread Albert Cahalan
On Tue, 2005-03-15 at 15:31 +0100, Bodo Eggert wrote: > (snipped the CC list - hope that's ok) > > On Mon, 14 Mar 2005, Albert Cahalan wrote: > > On Tue, 2005-03-15 at 00:08 +0100, Bodo Eggert wrote: > > > On Mon, 14 Mar 2005, Albert Cahalan wrote: > > Th

Re: [RFC][PATCH] new timeofday core subsystem (v. A3)

2005-03-15 Thread Albert Cahalan
On Mon, 2005-03-14 at 19:22 -0800, Christoph Lameter wrote: > On Mon, 14 Mar 2005, Albert Cahalan wrote: > > > When the vsyscall page is created, copy the one needed function > > into it. The kernel is already self-modifying in many places; this > > is nothing new. > &

Re: [RFC][PATCH] new timeofday core subsystem (v. A3)

2005-03-15 Thread Albert Cahalan
On Mon, 2005-03-14 at 19:22 -0800, Christoph Lameter wrote: On Mon, 14 Mar 2005, Albert Cahalan wrote: When the vsyscall page is created, copy the one needed function into it. The kernel is already self-modifying in many places; this is nothing new. AFAIK this will only works on ia32

Re: [PATCH][RFC] Make /proc/pid chmod'able

2005-03-15 Thread Albert Cahalan
On Tue, 2005-03-15 at 15:31 +0100, Bodo Eggert wrote: (snipped the CC list - hope that's ok) On Mon, 14 Mar 2005, Albert Cahalan wrote: On Tue, 2005-03-15 at 00:08 +0100, Bodo Eggert wrote: On Mon, 14 Mar 2005, Albert Cahalan wrote: This really isn't about security. Information

Re: Capabilities across execve

2005-03-15 Thread Albert Cahalan
Russell King, the latest person to notice defects, writes: However, the way the kernel is setup today, this seems impossible to achieve, which tends to make the whole idea of capabilities completely and utterly useless. How is this stuff supposed to work? Are my ideas of what's supposed to

Re: [PATCH][RFC] /proc umask and gid [was: Make /proc/pid chmod'able]

2005-03-15 Thread Albert Cahalan
On Wed, 2005-03-16 at 03:39 +0100, Rene Scharfe wrote: So, I gather from the feedback I've got that chmod'able /proc/pid would be a bit over the top. 8-) While providing the easiest and most intuitive user interface for changing the permissions on those directories, it is overkill. Paul is

Re: [PATCH][RFC] /proc umask and gid [was: Make /proc/pid chmod'able]

2005-03-15 Thread Albert Cahalan
Better interface: /sbin/sysctl -w proc.maps=0440 /sbin/sysctl -w proc.cmdline=0444 /sbin/sysctl -w proc.status=0444 The /etc/sysctl.conf file can be used to set these at boot time. - To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL

Re: [PATCH][RFC] Make /proc/ chmod'able

2005-03-14 Thread Albert Cahalan
On Tue, 2005-03-15 at 00:08 +0100, Bodo Eggert wrote: > On Mon, 14 Mar 2005, Albert Cahalan wrote: > > On Mon, 2005-03-14 at 10:42 +0100, Rene Scharfe wrote: > > > Albert Cahalan wrote: > > > > Why do you think users should not be allowed to chmod their processes' &

Re: [RFC][PATCH] new timeofday core subsystem (v. A3)

2005-03-14 Thread Albert Cahalan
On Mon, 2005-03-14 at 12:27 -0800, Matt Mackall wrote: > On Mon, Mar 14, 2005 at 12:04:07PM -0800, john stultz wrote: > > > > > > > > +static inline cycle_t read_timesource(struct timesource_t* ts) > > > > > > > > +{ > > > > > > > > + switch (ts->type) { > > > > > > > > + case

Re: [PATCH][RFC] Make /proc/ chmod'able

2005-03-14 Thread Albert Cahalan
On Mon, 2005-03-14 at 10:42 +0100, Rene Scharfe wrote: > Albert Cahalan wrote: > > This is a bad idea. Users should not be allowed to > > make this decision. This is rightly a decision for > > the admin to make. > > Why do you think users should not be allowed to chmo

Re: [PATCH][RFC] Make /proc/pid chmod'able

2005-03-14 Thread Albert Cahalan
On Mon, 2005-03-14 at 10:42 +0100, Rene Scharfe wrote: Albert Cahalan wrote: This is a bad idea. Users should not be allowed to make this decision. This is rightly a decision for the admin to make. Why do you think users should not be allowed to chmod their processes' /proc directories

Re: [RFC][PATCH] new timeofday core subsystem (v. A3)

2005-03-14 Thread Albert Cahalan
On Mon, 2005-03-14 at 12:27 -0800, Matt Mackall wrote: On Mon, Mar 14, 2005 at 12:04:07PM -0800, john stultz wrote: +static inline cycle_t read_timesource(struct timesource_t* ts) +{ + switch (ts-type) { + case TIMESOURCE_MMIO_32: +

Re: [PATCH][RFC] Make /proc/pid chmod'able

2005-03-14 Thread Albert Cahalan
On Tue, 2005-03-15 at 00:08 +0100, Bodo Eggert wrote: On Mon, 14 Mar 2005, Albert Cahalan wrote: On Mon, 2005-03-14 at 10:42 +0100, Rene Scharfe wrote: Albert Cahalan wrote: Why do you think users should not be allowed to chmod their processes' /proc directories? Isn't it similar

Re: [PATCH][RFC] Make /proc/ chmod'able

2005-03-13 Thread Albert Cahalan
> OK, folks, another try to enhance privacy by hiding > process details from other users. Why not simply use > chmod to set the permissions of /proc/ directories? > This patch implements it. > > Children processes inherit their parents' proc > permissions on fork. You can only set (and remove) >

Re: [PATCH][RFC] Make /proc/pid chmod'able

2005-03-13 Thread Albert Cahalan
OK, folks, another try to enhance privacy by hiding process details from other users. Why not simply use chmod to set the permissions of /proc/pid directories? This patch implements it. Children processes inherit their parents' proc permissions on fork. You can only set (and remove) read

Re: User mode drivers: part 2: PCI device handling (patch 1/2 for 2.6.11)

2005-03-11 Thread Albert Cahalan
On Fri, 2005-03-11 at 19:15 +, Alan Cox wrote: > > You forgot the PCI domain (a.k.a. hose, phb...) number. > > Also, you might encode bus,slot,function according to > > the PCI spec. So that gives: > > > > long usr_pci_open(unsigned pcidomain, unsigned devspec, __u64 dmamask); > > Still

Re: User mode drivers: part 2: PCI device handling (patch 1/2 for 2.6.11)

2005-03-11 Thread Albert Cahalan
On Fri, 2005-03-11 at 19:15 +, Alan Cox wrote: You forgot the PCI domain (a.k.a. hose, phb...) number. Also, you might encode bus,slot,function according to the PCI spec. So that gives: long usr_pci_open(unsigned pcidomain, unsigned devspec, __u64 dmamask); Still insufficient

Re: User mode drivers: part 2: PCI device handling (patch 1/2 for 2.6.11)

2005-03-10 Thread Albert Cahalan
Peter Chubb writes: > There are three new system calls: > > long usr_pci_open(int bus, int slot, int function, __u64 dma_mask); > Returns a filedescriptor for the PCI device described > by bus,slot,function. It also enables the device, and sets it > up as a

Re: binary drivers and development

2005-03-10 Thread Albert Cahalan
Lennart Sorensen writes: > You forgot the very important: >- Only works on architecture it was compiled for. So anyone not > using i386 (and maybe later x86-64) is simply out of luck. What do > nvidia users that want accelerated nvidia drivers for X DRI do > right now if they

Re: binary drivers and development

2005-03-10 Thread Albert Cahalan
Lennart Sorensen writes: You forgot the very important: - Only works on architecture it was compiled for. So anyone not using i386 (and maybe later x86-64) is simply out of luck. What do nvidia users that want accelerated nvidia drivers for X DRI do right now if they have

Re: User mode drivers: part 2: PCI device handling (patch 1/2 for 2.6.11)

2005-03-10 Thread Albert Cahalan
Peter Chubb writes: There are three new system calls: long usr_pci_open(int bus, int slot, int function, __u64 dma_mask); Returns a filedescriptor for the PCI device described by bus,slot,function. It also enables the device, and sets it up as a

Re: [patch] inotify for 2.6.11

2005-03-06 Thread Albert Cahalan
Christoph Hellwig writes: > On Sat, Mar 05, 2005 at 07:40:06PM -0500, Robert Love wrote: >> On Sun, 2005-03-06 at 00:04 +, Christoph Hellwig wrote: >>> The user interface is still bogus. >> >> I presume you are talking about the ioctl. I have tried to engage you >> and others on what

Re: [patch] inotify for 2.6.11

2005-03-06 Thread Albert Cahalan
Christoph Hellwig writes: On Sat, Mar 05, 2005 at 07:40:06PM -0500, Robert Love wrote: On Sun, 2005-03-06 at 00:04 +, Christoph Hellwig wrote: The user interface is still bogus. I presume you are talking about the ioctl. I have tried to engage you and others on what exactly you prefer

Re: [PATCH] audit: handle loginuid through proc

2005-02-25 Thread Albert Cahalan
On Thu, 2005-02-24 at 22:49 -0800, Chris Wright wrote: > * Albert Cahalan ([EMAIL PROTECTED]) wrote: > > Assuming you'd like ps to print the LUID, how about > > putting it with all the others? There are "Uid:" > > lines in the /proc/*/status files. > >

Re: [PATCH] audit: handle loginuid through proc

2005-02-25 Thread Albert Cahalan
On Thu, 2005-02-24 at 22:49 -0800, Chris Wright wrote: * Albert Cahalan ([EMAIL PROTECTED]) wrote: Assuming you'd like ps to print the LUID, how about putting it with all the others? There are Uid: lines in the /proc/*/status files. It's also set (written) via /proc, so it should

Re: [PATCH] audit: handle loginuid through proc

2005-02-24 Thread Albert Cahalan
Assuming you'd like ps to print the LUID, how about putting it with all the others? There are "Uid:" lines in the /proc/*/status files. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at

Re: [PATCH] A new entry for /proc

2005-02-24 Thread Albert Cahalan
[quoting various people...] > Here is a new entry developed for /proc that prints for each process > memory area (VMA) the size of rss. The maps from original kernel is > able to present the virtual size for each vma, but not the physical > size (rss). This entry can provide an additional

Re: [PATCH] A new entry for /proc

2005-02-24 Thread Albert Cahalan
[quoting various people...] Here is a new entry developed for /proc that prints for each process memory area (VMA) the size of rss. The maps from original kernel is able to present the virtual size for each vma, but not the physical size (rss). This entry can provide an additional

Re: [PATCH] audit: handle loginuid through proc

2005-02-24 Thread Albert Cahalan
Assuming you'd like ps to print the LUID, how about putting it with all the others? There are Uid: lines in the /proc/*/status files. - To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More majordomo info at

<    1   2