Re: [RFC] [PATCH] To refuse users from probing preempt_schedule()

2008-02-24 Thread Srinivasa DS
On Monday 25 February 2008 11:50:24 am Dave Hansen wrote: > On Mon, 2008-02-25 at 11:27 +0530, srinivasa wrote: > > This patch prohibits user from probing preempt_schedule(). One way of > > prohibiting the user from probing functions is by marking such > > functions with __kprobes. But this method

Re: [RFC] [PATCH] To refuse users from probing preempt_schedule()

2008-02-24 Thread Srinivasa DS
On Monday 25 February 2008 11:50:24 am Dave Hansen wrote: On Mon, 2008-02-25 at 11:27 +0530, srinivasa wrote: This patch prohibits user from probing preempt_schedule(). One way of prohibiting the user from probing functions is by marking such functions with __kprobes. But this method

[RFC] [PATCH] Refuse kprobe insertion on add/sub_preempt_counter()

2008-02-20 Thread Srinivasa Ds
Kprobes makes use of preempt_disable(),preempt_enable_noresched() and these functions inturn call add/sub_preempt_count(). So we need to refuse user from inserting probe in to these functions. This patch disallows user from probing add/sub_preempt_count(). Signed-off-by: Srinivasa DS <[EM

[RFC] [PATCH] Refuse kprobe insertion on add/sub_preempt_counter()

2008-02-20 Thread Srinivasa Ds
Kprobes makes use of preempt_disable(),preempt_enable_noresched() and these functions inturn call add/sub_preempt_count(). So we need to refuse user from inserting probe in to these functions. This patch disallows user from probing add/sub_preempt_count(). Signed-off-by: Srinivasa DS [EMAIL

Re: [RFC] [patch 1/2] add non_init_kernel_text_address

2007-12-31 Thread Srinivasa Ds
) init functions harder to read on some archs, but we already have that issue for modules and noone has complained. Thanks Rusty, This patch fixes my problem. Tested-by: Srinivasa DS <[EMAIL PROTECTED]> -- To unsubscribe from this list: send the line "unsubscribe linux-kernel&q

Re: [RFC] [patch 1/2] add non_init_kernel_text_address

2007-12-31 Thread Srinivasa Ds
) init functions harder to read on some archs, but we already have that issue for modules and noone has complained. Thanks Rusty, This patch fixes my problem. Tested-by: Srinivasa DS [EMAIL PROTECTED] -- To unsubscribe from this list: send the line unsubscribe linux-kernel in the body

Re: [RFC] [patch 1/2] add non_init_kernel_text_address

2007-12-17 Thread Srinivasa Ds
rchs. I think it is better to make use of new function than sacrificing __init function symbol information in backtrace. Thanks Srinivasa DS -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More maj

[RFC] [patch 2/2] Refuse kprobe insertion on __init section code

2007-12-17 Thread Srinivasa Ds
This patch makes use of persistent_kernel_text_address() to avoid probing __init functions. Signed-off-by: Srinivasa DS <[EMAIL PROTECTED]> Signed-off-by: Ananth N Mavinakayanahalli <[EMAIL PROTECTED]> --- kernel/kprobes.c |4 ++-- 1 file changed, 2 insertions(+), 2 deletio

[RFC] [patch 1/2] add non_init_kernel_text_address

2007-12-17 Thread Srinivasa Ds
persistent_kernel_text_address() to identify "non_init" text area. Signed-off-by: Srinivasa DS <[EMAIL PROTECTED]> Signed-off-by: Ananth N Mavinakayanahalli <[EMAIL PROTECTED]> --- include/linux/kernel.h |2 ++ kernel/extable.c | 16 +++- 2 files

[RFC] [patch 1/2] add non_init_kernel_text_address

2007-12-17 Thread Srinivasa Ds
persistent_kernel_text_address() to identify non_init text area. Signed-off-by: Srinivasa DS [EMAIL PROTECTED] Signed-off-by: Ananth N Mavinakayanahalli [EMAIL PROTECTED] --- include/linux/kernel.h |2 ++ kernel/extable.c | 16 +++- 2 files changed, 17 insertions(+), 1

[RFC] [patch 2/2] Refuse kprobe insertion on __init section code

2007-12-17 Thread Srinivasa Ds
This patch makes use of persistent_kernel_text_address() to avoid probing __init functions. Signed-off-by: Srinivasa DS [EMAIL PROTECTED] Signed-off-by: Ananth N Mavinakayanahalli [EMAIL PROTECTED] --- kernel/kprobes.c |4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) Index

Re: [RFC] [patch 1/2] add non_init_kernel_text_address

2007-12-17 Thread Srinivasa Ds
think it is better to make use of new function than sacrificing __init function symbol information in backtrace. Thanks Srinivasa DS -- To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org

Re: [RFC] [patch 1/2] add non_init_kernel_text_address

2007-12-14 Thread Srinivasa Ds
that. This patch creates non_init_kernel_text_address() to identify non_init text area. Signed-off-by: Srinivasa DS <[EMAIL PROTECTED]> Signed-off-by: Ananth N Mavinakayanahalli <[EMAIL PROTECTED]> --- include/linux/kernel.h |2 ++ kernel/extable.c | 16 +

Re: [RFC] [patch 2/2] Refuse kprobe insertion on __init section code

2007-12-14 Thread Srinivasa Ds
This patch makes use of regular_kernel_text_address() to avoid probing __init functions. Signed-off-by: Srinivasa DS <[EMAIL PROTECTED]> Signed-off-by: Ananth N Mavinakayanahalli <[EMAIL PROTECTED]> --- kernel/kprobes.c |4 ++-- 1 file changed, 2 insertions(+), 2 deletio

Re: [RFC] [patch 1/2] add non_init_kernel_text_address

2007-12-14 Thread Srinivasa Ds
non_init_kernel_text_address() to identify non_init text area. Signed-off-by: Srinivasa DS <[EMAIL PROTECTED]> Signed-off-by: Ananth N Mavinakayanahalli <[EMAIL PROTECTED]> --- include/linux/kernel.h |2 ++ kernel/extable.c | 16 +++- 2 files changed, 17 inse

Re: [RFC] [patch 2/2] Refuse kprobe insertion on __init section code

2007-12-14 Thread Srinivasa Ds
This patch makes use of regular_kernel_text_address() to avoid probing __init functions. Signed-off-by: Srinivasa DS [EMAIL PROTECTED] Signed-off-by: Ananth N Mavinakayanahalli [EMAIL PROTECTED] --- kernel/kprobes.c |4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) Index: linux

Re: [RFC] [patch 1/2] add non_init_kernel_text_address

2007-12-14 Thread Srinivasa Ds
non_init_kernel_text_address() to identify non_init text area. Signed-off-by: Srinivasa DS [EMAIL PROTECTED] Signed-off-by: Ananth N Mavinakayanahalli [EMAIL PROTECTED] --- include/linux/kernel.h |2 ++ kernel/extable.c | 16 +++- 2 files changed, 17 insertions(+), 1 deletion

Re: [RFC] [patch 1/2] add non_init_kernel_text_address

2007-12-14 Thread Srinivasa Ds
that. This patch creates non_init_kernel_text_address() to identify non_init text area. Signed-off-by: Srinivasa DS [EMAIL PROTECTED] Signed-off-by: Ananth N Mavinakayanahalli [EMAIL PROTECTED] --- include/linux/kernel.h |2 ++ kernel/extable.c | 16 +++- 2 files changed

[RFC] [patch 2/2] Refuse kprobe insertion on __init section code

2007-12-13 Thread Srinivasa Ds
This patch makes use of non_init_kernel_text_address() to avoid probing __init functions. Signed-off-by: Srinivasa DS <[EMAIL PROTECTED]> Signed-off-by: Ananth N Mavinakayanahalli <[EMAIL PROTECTED]> --- kernel/kprobes.c |4 ++-- 1 file changed, 2 insertions(+), 2 deletio

[RFC] [patch 1/2] add non_init_kernel_text_address

2007-12-13 Thread Srinivasa Ds
to suggestions for a better functionname. Signed-off-by: Srinivasa DS <[EMAIL PROTECTED]> Signed-off-by: Ananth N Mavinakayanahalli <[EMAIL PROTECTED]> --- include/linux/kernel.h |2 ++ kernel/extable.c | 16 +++- 2 files changed, 17 insertions(+), 1 deleti

[RFC] [patch 2/2] Refuse kprobe insertion on __init section code

2007-12-13 Thread Srinivasa Ds
This patch makes use of non_init_kernel_text_address() to avoid probing __init functions. Signed-off-by: Srinivasa DS [EMAIL PROTECTED] Signed-off-by: Ananth N Mavinakayanahalli [EMAIL PROTECTED] --- kernel/kprobes.c |4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) Index: linux

[RFC] [patch 1/2] add non_init_kernel_text_address

2007-12-13 Thread Srinivasa Ds
to suggestions for a better functionname. Signed-off-by: Srinivasa DS [EMAIL PROTECTED] Signed-off-by: Ananth N Mavinakayanahalli [EMAIL PROTECTED] --- include/linux/kernel.h |2 ++ kernel/extable.c | 16 +++- 2 files changed, 17 insertions(+), 1 deletion(-) Index: linux

Re: [PATCH 14/27] powerpc: ptrace generic resume

2007-12-03 Thread Srinivasa Ds
@ long arch_ptrace(struct task_struct *child, long request, long addr, long data) break; } Thanks Srinivasa DS Linux Technology Centre IBM. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED

Re: [PATCH 14/27] powerpc: ptrace generic resume

2007-12-03 Thread Srinivasa Ds
arch_ptrace(struct task_struct *child, long request, long addr, long data) break; } Thanks Srinivasa DS Linux Technology Centre IBM. -- To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More majordomo info

Re: [PATCH][RFC] kprobes: Add user entry-handler in kretprobes

2007-11-14 Thread Srinivasa Ds
st(because it took a lot time to return). So only thing to match the entry_handler() with its return_handler() is return probe instance(ri)'s address, which user has to take care explicitly (Hence I feel sol a) would be nice). Thanks Srinivasa DS - To unsubscribe from this list: send the line &q

Re: [PATCH][RFC] kprobes: Add user entry-handler in kretprobes

2007-11-14 Thread Srinivasa Ds
it took a lot time to return). So only thing to match the entry_handler() with its return_handler() is return probe instance(ri)'s address, which user has to take care explicitly (Hence I feel sol a) would be nice). Thanks Srinivasa DS - To unsubscribe from this list: send the line unsubscribe

Re: [PATCH][RFC] kprobes: Add user entry-handler in kretprobes

2007-11-13 Thread Srinivasa Ds
Abhishek Sagar wrote: On Nov 13, 2007 12:09 AM, Abhishek Sagar <[EMAIL PROTECTED]> wrote: Whoops...sry for the repeated email..emailer trouble. Expecting this one to makes it to the list. Summary again: This patch introduces a provision to specify a user-defined callback to run at function

Re: [PATCH][RFC] kprobes: Add user entry-handler in kretprobes

2007-11-13 Thread Srinivasa Ds
Abhishek Sagar wrote: On Nov 13, 2007 12:09 AM, Abhishek Sagar [EMAIL PROTECTED] wrote: Whoops...sry for the repeated email..emailer trouble. Expecting this one to makes it to the list. Summary again: This patch introduces a provision to specify a user-defined callback to run at function

Re: [RFC] [PATCH] To vunmap correct address in text_poke()(kprobes)

2007-07-25 Thread Srinivasa Ds
+0x141/0x174 [] tracesys+0xdc/0xe1 Signed-off-by: Srinivasa DS <[EMAIL PROTECTED]> Signed-off-by: Suzuki K P <[EMAIL PROTECTED]> Signed-off-by: Prasanna S Panchamukhi <[EMAIL PROTECTED]> Index: linux-2.6.23-rc1/arch/i386/ke

[RFC] [PATCH] To vunmap correct address in text_poke()(kprobes)

2007-07-25 Thread Srinivasa Ds
== This indicates that vunmap() is not receving the page-aligned address in text_poke(). So the below attached patch will address this issue. Please let me know your comments. Signed-off-by: Srinivasa DS <[EMAIL PROTECTED]> Signed-off-by: Suzuki K P <[EMAIL PROTECTED]> Index: linux-2.6

[RFC] [PATCH] To vunmap correct address in text_poke()(kprobes)

2007-07-25 Thread Srinivasa Ds
your comments. Signed-off-by: Srinivasa DS [EMAIL PROTECTED] Signed-off-by: Suzuki K P [EMAIL PROTECTED] Index: linux-2.6.23-rc1/arch/i386/kernel/alternative.c === --- linux-2.6.23-rc1.orig/arch/i386/kernel/alternative.c

Re: [RFC] [PATCH] To vunmap correct address in text_poke()(kprobes)

2007-07-25 Thread Srinivasa Ds
[8025b5cf] sys_init_module+0x1626/0x1788 [802aaf12] dput+0x3f/0xfa [8026bf91] audit_syscall_entry+0x141/0x174 [8020bee5] tracesys+0xdc/0xe1 Signed-off-by: Srinivasa DS [EMAIL PROTECTED] Signed-off-by: Suzuki K P

Re: [RFC] [PATCH] cpuset operations causes Badness at mm/slab.c:777 warning

2007-06-01 Thread Srinivasa Ds
On Friday 01 June 2007 12:57:53 Srinivasa Ds wrote: I have modified the patch little bit, Thanks Vatsa for input and hence resending it. Please let me know your comments on this. Signed-off-by: Srinivasa DS <[EMAIL PROTECTED]> --- kernel/cpuset.c | 10 ++ 1 file chang

[RFC] [PATCH] cpuset operations causes Badness at mm/slab.c:777 warning

2007-06-01 Thread Srinivasa Ds
= This is because "npids"(represnets number of pids in that cpuset) in "cpu_task_open" is zero and it tries allocate 0 bytes through kmalloc. Below patch fixes this problem. Please let me know your comments on this. Signed-off-by: Srinivasa DS <[EMAIL PROTECTED]&

[RFC] [PATCH] cpuset operations causes Badness at mm/slab.c:777 warning

2007-06-01 Thread Srinivasa Ds
= This is because npids(represnets number of pids in that cpuset) in cpu_task_open is zero and it tries allocate 0 bytes through kmalloc. Below patch fixes this problem. Please let me know your comments on this. Signed-off-by: Srinivasa DS [EMAIL PROTECTED] --- kernel/cpuset.c |9

Re: [RFC] [PATCH] cpuset operations causes Badness at mm/slab.c:777 warning

2007-06-01 Thread Srinivasa Ds
On Friday 01 June 2007 12:57:53 Srinivasa Ds wrote: I have modified the patch little bit, Thanks Vatsa for input and hence resending it. Please let me know your comments on this. Signed-off-by: Srinivasa DS [EMAIL PROTECTED] --- kernel/cpuset.c | 10 ++ 1 file changed, 10 insertions

Re: kernel expection generated with 2.6.21-mm1 kernel boot up

2007-05-09 Thread Srinivasa Ds
Christoph Lameter wrote: > On Tue, 8 May 2007, Srinivasa Ds wrote: > >> Looks like there is a bug in SLUB implementaion for ppc64 in 2.6.21-mm1. >> I unmarked CONFIG_SLUB and build the kernel, its booting cleary now. >> >> Thanks >> Srinivasa DS > > Th

Re: kernel expection generated with 2.6.21-mm1 kernel boot up

2007-05-09 Thread Srinivasa Ds
Christoph Lameter wrote: On Tue, 8 May 2007, Srinivasa Ds wrote: Looks like there is a bug in SLUB implementaion for ppc64 in 2.6.21-mm1. I unmarked CONFIG_SLUB and build the kernel, its booting cleary now. Thanks Srinivasa DS This is a known issue for PPC with more than 4 processors

Re: kernel expection generated with 2.6.21-mm1 kernel boot up

2007-05-08 Thread Srinivasa Ds
> msr: 80009032 > Looks like there is a bug in SLUB implementaion for ppc64 in 2.6.21-mm1. I unmarked CONFIG_SLUB and build the kernel, its booting cleary now. Thanks Srinivasa DS - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body o

Re: kernel expection generated with 2.6.21-mm1 kernel boot up

2007-05-08 Thread Srinivasa Ds
in 2.6.21-mm1. I unmarked CONFIG_SLUB and build the kernel, its booting cleary now. Thanks Srinivasa DS - To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please

[PATCH] Build break on ppc64 for 2.6.21-rc7-mm2

2007-05-02 Thread Srinivasa Ds
= Since code is not compatible with struct sk_buff change, we have this error. Below patch should fix this problem. Please let me know your comments on this. Signed-off-by: Srinivasa Ds <[EMAIL PROTECTED]> --- drivers/net/ehea/ehea_main.c |6 +++--- 1 file changed, 3 insertions(+), 3 del

[PATCH] Build break on ppc64 for 2.6.21-rc7-mm2

2007-05-02 Thread Srinivasa Ds
= Since code is not compatible with struct sk_buff change, we have this error. Below patch should fix this problem. Please let me know your comments on this. Signed-off-by: Srinivasa Ds [EMAIL PROTECTED] --- drivers/net/ehea/ehea_main.c |6 +++--- 1 file changed, 3 insertions(+), 3 deletions

Re: [PATCH] Transparently handle <.symbol> lookup for kprobes

2007-04-24 Thread Srinivasa Ds
Paul Mackerras wrote: > Srinivasa Ds writes: > >> +} else {\ >> +char dot_name[KSYM_NAME_LEN+1]; \ >> +dot_name[0] = '.'; \ &g

Re: [PATCH] Transparently handle .symbol lookup for kprobes

2007-04-24 Thread Srinivasa Ds
Paul Mackerras wrote: Srinivasa Ds writes: +} else {\ +char dot_name[KSYM_NAME_LEN+1]; \ +dot_name[0] = '.'; \ +dot_name[1] = '\0

[PATCH] Transparently handle <.symbol> lookup for kprobes

2007-04-23 Thread Srinivasa Ds
ep do_fork c006283c T .do_fork == User needs add "." to "do_fork" kp.symbol_name = ".do_fork"; This makes kprobe modules unportable. Below patch fixes the problem. Signed-off-by: Srinivasa Ds <

[PATCH] Transparently handle .symbol lookup for kprobes

2007-04-23 Thread Srinivasa Ds
c006283c T .do_fork == User needs add . to do_fork kp.symbol_name = .do_fork; This makes kprobe modules unportable. Below patch fixes the problem. Signed-off-by: Srinivasa Ds [EMAIL PROTECTED] Signed-off-by: Ananth N Mavinakayanahalli [EMAIL

[PATCH] Build break on ppc64 for 2.6.21-rc6-mm1

2007-04-10 Thread Srinivasa Ds
declaration of function ‘sysdev_register’ make[1]: *** [arch/powerpc/sysdev/timer.o] Error 1 make: *** [arch/powerpc/sysdev] Error 2 === Below patch fixes this problem. please let me know comments on this. Signed-off-by: Srinivasa Ds <[EMAIL PROTECTED]> ---

[PATCH] Build break on ppc64 for 2.6.21-rc6-mm1

2007-04-10 Thread Srinivasa Ds
declaration of function ‘sysdev_register’ make[1]: *** [arch/powerpc/sysdev/timer.o] Error 1 make: *** [arch/powerpc/sysdev] Error 2 === Below patch fixes this problem. please let me know comments on this. Signed-off-by: Srinivasa Ds [EMAIL PROTECTED] --- arch/powerpc

Re: [RFC] [PATCH] To list all active probes in the system---Take-2

2007-02-08 Thread Srinivasa Ds
Andrew Morton wrote: > On Wed, 07 Feb 2007 10:55:23 +0530 > Srinivasa Ds <[EMAIL PROTECTED]> wrote: > >> --- linux-2.6.20.orig/fs/debugfs/inode.c >> +++ linux-2.6.20/fs/debugfs/inode.c >> @@ -25,6 +25,7 @@ >> >> if (retval)

Re: [RFC] [PATCH] To list all active probes in the system---Take-2

2007-02-08 Thread Srinivasa Ds
Andrew Morton wrote: On Wed, 07 Feb 2007 10:55:23 +0530 Srinivasa Ds [EMAIL PROTECTED] wrote: --- linux-2.6.20.orig/fs/debugfs/inode.c +++ linux-2.6.20/fs/debugfs/inode.c @@ -25,6 +25,7 @@ if (retval) subsystem_unregister(debug_subsys); +debugfs_kprobe_init

Re: [RFC] [PATCH] To list all active probes in the system

2007-02-06 Thread Srinivasa Ds
Frederik Deweerdt wrote: > Hi, > > Comments below, > > On Tue, Feb 06, 2007 at 08:17:06PM +0530, Srinivasa Ds wrote: >> Srinivasa Ds wrote: >>> Christoph Hellwig wrote: >>>> On Tue, Feb 06, 2007 at 03:25:35PM +0530, Srinivasa Ds wrote: >>>>&

Re: [RFC] [PATCH] To list all active probes in the system

2007-02-06 Thread Srinivasa Ds
Srinivasa Ds wrote: > Christoph Hellwig wrote: >> On Tue, Feb 06, 2007 at 03:25:35PM +0530, Srinivasa Ds wrote: >>> Hi folks >>> >>> I have developed a patch, that lists all active probes in the >>> system. I have done this through /proc int

Re: [RFC] [PATCH] To list all active probes in the system

2007-02-06 Thread Srinivasa Ds
Christoph Hellwig wrote: > On Tue, Feb 06, 2007 at 03:25:35PM +0530, Srinivasa Ds wrote: >> Hi folks >> >> I have developed a patch, that lists all active probes in the >> system. I have done this through /proc interface. Currently list is >> availa

Re: [RFC] [PATCH] To list all active probes in the system

2007-02-06 Thread Srinivasa Ds
Andrew Morton wrote: > On Tue, 06 Feb 2007 15:25:35 +0530 Srinivasa Ds <[EMAIL PROTECTED]> wrote: > >> I have developed a patch, that lists all active probes in the >> system. > > userspace added the probes, so userspace should know where they all are? Irres

[RFC] [PATCH] To list all active probes in the system

2007-02-06 Thread Srinivasa Ds
s4_dentry_release+0x0 autofs4 c00275d0 k kretprobe_trampoline+0x0 c00bfd18 k .vfs_write+0x0 Please let me know your comments on this. Signed-off-by: Srinivasa DS <[EMAIL PROTECTED]> fs/proc/root.c |4 ++ include/linux/kp

[RFC] [PATCH] To list all active probes in the system

2007-02-06 Thread Srinivasa Ds
c00275d0 k kretprobe_trampoline+0x0 c00bfd18 k .vfs_write+0x0 Please let me know your comments on this. Signed-off-by: Srinivasa DS [EMAIL PROTECTED] fs/proc/root.c |4 ++ include/linux/kprobes.h |7 +++ kernel/kprobes.c

Re: [RFC] [PATCH] To list all active probes in the system

2007-02-06 Thread Srinivasa Ds
Andrew Morton wrote: On Tue, 06 Feb 2007 15:25:35 +0530 Srinivasa Ds [EMAIL PROTECTED] wrote: I have developed a patch, that lists all active probes in the system. userspace added the probes, so userspace should know where they all are? Irrespective of the number of users/modules

Re: [RFC] [PATCH] To list all active probes in the system

2007-02-06 Thread Srinivasa Ds
Christoph Hellwig wrote: On Tue, Feb 06, 2007 at 03:25:35PM +0530, Srinivasa Ds wrote: Hi folks I have developed a patch, that lists all active probes in the system. I have done this through /proc interface. Currently list is available under /proc/kprobes/list. Any suggestions

Re: [RFC] [PATCH] To list all active probes in the system

2007-02-06 Thread Srinivasa Ds
Srinivasa Ds wrote: Christoph Hellwig wrote: On Tue, Feb 06, 2007 at 03:25:35PM +0530, Srinivasa Ds wrote: Hi folks I have developed a patch, that lists all active probes in the system. I have done this through /proc interface. Currently list is available under /proc/kprobes/list

Re: [RFC] [PATCH] To list all active probes in the system

2007-02-06 Thread Srinivasa Ds
Frederik Deweerdt wrote: Hi, Comments below, On Tue, Feb 06, 2007 at 08:17:06PM +0530, Srinivasa Ds wrote: Srinivasa Ds wrote: Christoph Hellwig wrote: On Tue, Feb 06, 2007 at 03:25:35PM +0530, Srinivasa Ds wrote: Hi folks I have developed a patch, that lists all active probes

Re: [Need Help] Cpuhotplug operations on 32-bit mode of xeon-64bit processor crashes the system.

2007-01-30 Thread Srinivasa DS
envioronment. It happens in 32-bit compatibility mode. Problem is in calculation of apicid's and delivery of IPI's. I saw a oops,when I do cpuhotplug operations on it. If you want any further information,please free to ask. Thanks Srinivasa Ds thanks, suresh On Mon, Jan 22, 2007 at 01:42:48PM +0530

Re: [Need Help] Cpuhotplug operations on 32-bit mode of xeon-64bit processor crashes the system.

2007-01-30 Thread Srinivasa DS
envioronment. It happens in 32-bit compatibility mode. Problem is in calculation of apicid's and delivery of IPI's. I saw a oops,when I do cpuhotplug operations on it. If you want any further information,please free to ask. Thanks Srinivasa Ds thanks, suresh On Mon, Jan 22, 2007 at 01:42:48PM +0530

[Need Help] Cpuhotplug operations on 32-bit mode of xeon-64bit processor crashes the system.

2007-01-21 Thread Srinivasa Ds
of apic clusters if there are only 2 cpus). Hence it makes me to conclude that problem is in delivery of IPI's. So Iam completely stuck here. Iam not able to move forward in debugging. So could someone(may be intel folks) please throw some light on this. Thanks in advance Srinivasa DS LTC-

[Need Help] Cpuhotplug operations on 32-bit mode of xeon-64bit processor crashes the system.

2007-01-21 Thread Srinivasa Ds
). Hence it makes me to conclude that problem is in delivery of IPI's. So Iam completely stuck here. Iam not able to move forward in debugging. So could someone(may be intel folks) please throw some light on this. Thanks in advance Srinivasa DS LTC-IBM - To unsubscribe from this list: send

Re: [PATCH 2.6.19 5/5] fs: freeze_bdev with semaphore not mutex

2007-01-12 Thread Srinivasa Ds
rnel) here. Please let me know your comments on this. Signed-off-by: Srinivasa DS <[EMAIL PROTECTED]> Signed-off-by: Alasdair G Kergon <[EMAIL PROTECTED]> Cc: Ingo Molnar <[EMAIL PROTECTED]> Cc: Eric Sandeen <[EMAIL PROTECTED]> Cc: [EMAIL PROTECTED] fs/block_dev.c |

Re: [PATCH 2.6.19 5/5] fs: freeze_bdev with semaphore not mutex

2007-01-12 Thread Srinivasa Ds
e again. Let true semaphores be semaphores, and make all real mutexes mutexes. But lets not make actual semaphores use mutex code... ". So Iam reproposing my patch(taken against latest kernel) here. Please let me know your comments on this. Signed-off-by: Srinivasa DS <[EMAIL PROTECTED]

Re: [PATCH 2.6.19 5/5] fs: freeze_bdev with semaphore not mutex

2007-01-12 Thread Srinivasa Ds
, and make all real mutexes mutexes. But lets not make actual semaphores use mutex code... . So Iam reproposing my patch(taken against latest kernel) here. Please let me know your comments on this. Signed-off-by: Srinivasa DS [EMAIL PROTECTED] Signed-off-by: Alasdair G Kergon [EMAIL PROTECTED] Cc: Ingo

Re: [PATCH 2.6.19 5/5] fs: freeze_bdev with semaphore not mutex

2007-01-12 Thread Srinivasa Ds
-off-by: Srinivasa DS [EMAIL PROTECTED] Signed-off-by: Alasdair G Kergon [EMAIL PROTECTED] Cc: Ingo Molnar [EMAIL PROTECTED] Cc: Eric Sandeen [EMAIL PROTECTED] Cc: [EMAIL PROTECTED] fs/block_dev.c |2 +- fs/buffer.c|6 -- fs/super.c |4 ++-- include/linux

Re: JFS: possible recursive locking detected

2007-01-09 Thread Srinivasa Ds
=== So below patch should fix this problem,please test this. Let me know your comments on this. Signed-off-by: Srinivasa DS <[EMAIL PROTECTED]> namei.c |4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)

Re: JFS: possible recursive locking detected

2007-01-09 Thread Srinivasa Ds
; === So below patch should fix this problem,please test this. Let me know your comments on this. Signed-off-by: Srinivasa DS [EMAIL PROTECTED] namei.c |4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) Index: linux-2.6.20-rc4/fs/jfs/namei.c

[RFC][PATCH] Mount problem with the GFS2 code

2006-11-29 Thread Srinivasa Ds
lves this problem. Please let me know your comments. ======== Signed-off-by: Srinivasa DS <[EMAIL PROTECTED]> super.c |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) Index: linux-2.6.19-rc6/fs/gfs2/super.c === --- linux-2.

Re: PM-Timer clock source is slow. Try something else: How slow? What other source(s)?

2006-11-29 Thread Srinivasa Ds
but not necessarily). thanks -john - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/ Thanks Srin

Re: PM-Timer clock source is slow. Try something else: How slow? What other source(s)?

2006-11-29 Thread Srinivasa Ds
-john - To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/ Thanks Srinivasa DS - To unsubscribe from this list

[RFC][PATCH] Mount problem with the GFS2 code

2006-11-29 Thread Srinivasa Ds
-by: Srinivasa DS [EMAIL PROTECTED] super.c |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) Index: linux-2.6.19-rc6/fs/gfs2/super.c === --- linux-2.6.19-rc6.orig/fs/gfs2/super.c +++ linux-2.6.19-rc6/fs/gfs2/super.c