First  |  Prev |  Next  |  Last
Pages: 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582
blkdev: cgroup whitelist permission fix
* Chris Wright (chrisw(a) wrote: The cgroup device whitelist code gets confused when trying to grant permission to a disk partition that is not currently open. Part of blkdev_open() includes __blkdev_get() on the whole disk. This simply avoids the cgroup check for the whole disk case when openi... 15 Jul 2010 12:04
trace-cmd: Don't try to read unmapped memory.
This one isn't correct. It prevents the crash, but also can cause many trace records to be omitted. I will try to come up with a new patch for the problem I see. David Daney On 07/14/2010 03:12 PM, David Daney wrote: When tracecmd_peek_data() reads the last event by calling translate_data(), it will... 15 Jul 2010 12:04
[patch 1/1] block: Apply segment size and boundary limits to integrity data
From: Christof Schmitt <christof.schmitt(a)> Apply the conditions used in __blk_recalc_rq_segments also to integrity data: Adhere to the maximum segment size and the segment boundary set by the driver. Without this change, a driver would receive integrity data blocks that do not adhere to the limits set f... 15 Jul 2010 12:04
AppArmor: core policy routines
On Wed, Jul 14, 2010 at 8:43 PM, John Johansen <john.johansen(a)> wrote: The basic routines and defines for AppArmor policy. �AppArmor policy is defined by a few basic components. � � �profiles - the basic unit of confinement contain all the information � � � � � � � � to enforce policy on a tas... 15 Jul 2010 13:11
[PATCH] x86, cpu: Add Intel CPUID flags: ECMD, PLN, PTM and TSC_DEADLINE
x86, cpu: Add Intel CPUID flags: ECMD, PLN, PTM and TSC_DEADLINE The June 2010 revision of the Intel Software Developer's Manual[1] has added some new CPUID flags in Volume 2A. The new CPUID flags are: CPUID.01H:ECX[Bit 24] TSC_DEADLINE: A value of 1 indicates that the processors local APIC timer supports one-... 15 Jul 2010 12:03
[PATCH] kmemleak: Add support for NO_BOOTMEM configurations
With commits 08677214 and 59be5a8e, alloc_bootmem()/free_bootmem() and friends use the early_res functions for memory management when NO_BOOTMEM is enabled. This patch adds the kmemleak calls in the corresponding code paths for bootmem allocations. Signed-off-by: Catalin Marinas <catalin.marinas(a)> Cc: Pek... 15 Jul 2010 12:03
[PATCH 3/3] kmemleak: Add DocBook style comments to kmemleak.c
The description and parameters of the kmemleak API weren't obvious. This patch adds comments clarifying the API usage. Signed-off-by: Catalin Marinas <catalin.marinas(a)> Cc: Pekka Enberg <penberg(a)> --- mm/kmemleak.c | 80 ++++++++++++++++++++++++++++++++++++++++++--------------- 1 files c... 15 Jul 2010 12:03
[tip:x86/urgent] x86: Force HPET readback_cmp for all ATI chipsets
Commit-ID: 08be97962bf338161325d4901642f956ce8c1adb Gitweb: Author: Thomas Gleixner <tglx(a)> AuthorDate: Wed, 14 Jul 2010 21:36:27 +0200 Committer: Thomas Gleixner <tglx(a)> CommitDate: Thu, 15 Jul 2010 17:10:02 +02... 15 Jul 2010 12:03
[PATCH 2/3] kmemleak: Introduce a default off mode for kmemleak
From: Jason Baron <jbaron(a)> Introduce a new DEBUG_KMEMLEAK_DEFAULT_OFF config parameter that allows kmemleak to be disabled by default, but enabled on the command line via: kmemleak=on. Although a reboot is required to turn it on, its still useful to not require a re-compile. Signed-off-by: Jason Bar... 15 Jul 2010 12:03
Please teach me X86 I/O port 0x61
Dear all. I investigate about NMI kernel messages. Linux kernel read 0x61 address using inb(61h). I search a amd opteron cpu following manuals. but I do not find explanation of 0x61 address. 22 Jul 2010 14:43
First  |  Prev |  Next  |  Last
Pages: 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582