Re: scsi subsystem in linux

2013-11-05 Thread nidhi mittal hada
csi layer request function ? On Tue, Nov 5, 2013 at 6:34 PM, nidhi mittal hada wrote: > *Setting of sd_prep_fn()* > sd_probe is called* whenever a* *new scsi device is attached to the > system. * > > sd_probe calls -> sd_probe_async-> > inside sd_probe_async

Re: scsi subsystem in linux

2013-11-05 Thread nidhi mittal hada
ep_fn); *Calling of sd_prep_fn* ? Is this request queue sdp->request_queue, different from the request queue, for which scsi_prep_fn is used?? Are they on different layers ? Is there some relation between them ? Thanks Nidhi On Tue, Nov 5, 2013 at 6:13 PM, nidhi mittal hada wrote: &

Re: scsi subsystem in linux

2013-11-05 Thread nidhi mittal hada
is scsi_prep_fn not the sd_prep_fn isnt it ??* Then where is sd_prep_fn is used for ?? Thanks Nidhi On Tue, Nov 5, 2013 at 5:39 PM, Jack Wang wrote: > Hi Nidhi, > > About the function call trace you can use ftrace to find out, another > useful tool is scsi_logging_level to

scsi subsystem in linux

2013-11-05 Thread nidhi mittal hada
Hi All i have got a requirement where I need to encrypt/decrypt data that goes from scsi layer to a particular block device. As per my understanding till now on scsi subsystem in linux, i think i need to use crypto api and call appropriate encrypt/decrypt function from sd driver for block device.

Re: Understanding disassembly x86 + understanding function call + parameter pass and stack frame

2013-09-03 Thread nidhi mittal hada
e->get_sb(type, flags, name, data, mnt);>>>>>>>>>>>>>>>>thats the line i want to catch, in assembly above. Where is this call made in assembly ???* if (error < 0) goto out_free_secdata; BUG_ON(!mnt->mnt_sb);

Re: Understanding disassembly x86 + understanding function call + parameter pass and stack frame

2013-08-14 Thread nidhi mittal hada
On Wed, Aug 14, 2013 at 3:51 PM, nidhi mittal hada wrote: > > > On Tue, Aug 13, 2013 at 6:02 PM, amit mehta wrote: > >> On Tue, Aug 13, 2013 at 5:47 PM, nidhi mittal hada >> wrote: >> > thats the information of coredump file:- >> > KERNEL: vml

Re: Understanding disassembly x86 + understanding function call + parameter pass and stack frame

2013-08-14 Thread nidhi mittal hada
On Tue, Aug 13, 2013 at 6:02 PM, amit mehta wrote: > On Tue, Aug 13, 2013 at 5:47 PM, nidhi mittal hada > wrote: > > thats the information of coredump file:- > > KERNEL: vmlinux > > DUMPFILE: vmcore.1 [PARTIAL DUMP] > > CPUS: 8 > >

Re: Understanding disassembly x86 + understanding function call + parameter pass and stack frame

2013-08-13 Thread nidhi mittal hada
On Mon, Aug 12, 2013 at 8:37 PM, amit mehta wrote: > On Mon, Aug 12, 2013 at 5:28 PM, nidhi mittal hada > wrote: > > Questions:- > > 1)Which memory address in stack contains struct super_block *s > > 2)how does disassembly helps in knowing which register contain the s

Re: Understanding disassembly x86 + understanding function call + parameter pass and stack frame

2013-08-12 Thread nidhi mittal hada
9, 2013 at 1:19 PM, Tayade, Nilesh > wrote: > >> > -Original Message- >> > From: kernelnewbies-boun...@kernelnewbies.org [mailto:kernelnewbies- >> > boun...@kernelnewbies.org] On Behalf Of Matthias Brugger >> > Sent: Tuesday, August 06, 2013 7:14 PM

BKL- BIG kernel lock + smp

2013-08-12 Thread nidhi mittal hada
Hi all, I have an smp linux redhat kernel running on many cpu cores. I know that one process running on one of cpu has tried for Big kernel lock . I am finding that another process on another CPU is trying for BKL. My question is :- - Being on different processors , can t

Fwd: Understanding disassembly x86 + understanding function call + parameter pass and stack frame

2013-08-06 Thread nidhi mittal hada
-- Forwarded message -- From: nidhi mittal hada Date: Tue, Aug 6, 2013 at 2:16 PM Subject: Understanding disassembly x86 + understanding function call + parameter pass and stack frame To: Kernelnewbies Cc: Mulyadi Santosa Hi All, I am using crash tool to analyze core dump