Re: [RFC] ptrace: add generic SET_SYSCALL request

2014-11-07 Thread Roland McGrath
Not that I'm actually involved any more, but I'd endorse the user_regset approach and not the new request. On many (most?) machines, it's already part of the main integer regset (orig_rax et al) and adding another mechanism is redundant. Using user_regset also means there won't be a word of

Re: [RFC] ptrace: add generic SET_SYSCALL request

2014-11-07 Thread Roland McGrath
Not that I'm actually involved any more, but I'd endorse the user_regset approach and not the new request. On many (most?) machines, it's already part of the main integer regset (orig_rax et al) and adding another mechanism is redundant. Using user_regset also means there won't be a word of

Re: [PATCH] Update Roland McGrath's mail

2014-07-15 Thread Roland McGrath
That's OK with me. But I'm not really actively involved in kernel maintenance any more (though happy to answer anything Oleg wants advice on). Acked-By: Roland McGrath Thanks, Roland -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message

Re: [PATCH] Update Roland McGrath's mail

2014-07-15 Thread Roland McGrath
That's OK with me. But I'm not really actively involved in kernel maintenance any more (though happy to answer anything Oleg wants advice on). Acked-By: Roland McGrath rol...@hack.frob.com Thanks, Roland -- To unsubscribe from this list: send the line unsubscribe linux-kernel in the body

Re: [PATCH 3/4] Add 32 bit VDSO time support for 32 bit kernel

2014-02-03 Thread Roland McGrath
> > config COMPAT_VDSO > > def_bool y > > prompt "Compat VDSO support" > > depends on X86_32 || IA32_EMULATION > > ---help--- > > Map the 32-bit VDSO to the predictable old-style address too. > > > > Say N here if you are running a sufficiently

Re: [PATCH 3/4] Add 32 bit VDSO time support for 32 bit kernel

2014-02-03 Thread Roland McGrath
config COMPAT_VDSO def_bool y prompt Compat VDSO support depends on X86_32 || IA32_EMULATION ---help--- Map the 32-bit VDSO to the predictable old-style address too. Say N here if you are running a sufficiently recent glibc

Re: [RFC/PATCH] Implement new PTRACE_EVENT_SYSCALL_{ENTER,EXIT}

2014-01-09 Thread Roland McGrath
> I won't argue, but it is not clear to me if this is really useful, > given that the debugger can read the regs. I do see the utility of having a consistent machine-independent way to get the syscall number from userspace. But note that this could be probably accomplished with just a uapi

Re: [RFC/PATCH] Implement new PTRACE_EVENT_SYSCALL_{ENTER,EXIT}

2014-01-09 Thread Roland McGrath
I won't argue, but it is not clear to me if this is really useful, given that the debugger can read the regs. I do see the utility of having a consistent machine-independent way to get the syscall number from userspace. But note that this could be probably accomplished with just a uapi header

Re: [PATCH 6/6] Add 32 bit VDSO support for 32 and 64 bit kernels

2012-12-20 Thread Roland McGrath
The Kconfig text for COMPAT_VDSO suggests that glibc versions prior to 2.3.3 may have relied on the fixed address. I can't find anything in the libc revision history to explain that (AFAIK the code always used AT_SYSINFO* since it started using the vDSO at all), but it might have been something

Re: [PATCH 6/6] Add 32 bit VDSO support for 32 and 64 bit kernels

2012-12-20 Thread Roland McGrath
The Kconfig text for COMPAT_VDSO suggests that glibc versions prior to 2.3.3 may have relied on the fixed address. I can't find anything in the libc revision history to explain that (AFAIK the code always used AT_SYSINFO* since it started using the vDSO at all), but it might have been something

Re: [PATCH] Include asm/siginfo.h in linux/coredump.h

2012-10-10 Thread Roland McGrath
There are other cases that just forward declare 'struct siginfo' and use it instead of the typedef names (e.g. linux/sched.h). -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at

Re: [PATCH] Include asm/siginfo.h in linux/coredump.h

2012-10-10 Thread Roland McGrath
There are other cases that just forward declare 'struct siginfo' and use it instead of the typedef names (e.g. linux/sched.h). -- To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to majord...@vger.kernel.org More majordomo info at

Re: Updated: [PATCH] hardening: add PROT_FINAL prot flag to mmap/mprotect

2012-10-03 Thread Roland McGrath
> > Again: has this proposal been reviewed by the glibc maintainers? If > > so, what was their position on it? > > Ard have you talked with them? I would expect it would be welcomed. > Roland, do you know who would be the right person to ask about this > for glibc? (patch:

Re: Updated: [PATCH] hardening: add PROT_FINAL prot flag to mmap/mprotect

2012-10-03 Thread Roland McGrath
Again: has this proposal been reviewed by the glibc maintainers? If so, what was their position on it? Ard have you talked with them? I would expect it would be welcomed. Roland, do you know who would be the right person to ask about this for glibc? (patch:

Re: [PATCH -mm v2] coredump: extend core dump note section to contain file names of mapped files

2012-09-18 Thread Roland McGrath
The code needs to be macroized a bit so that compat_binfmt_elf.c will produce a version that encodes 32-bit values correctly so as to be compatible with the output of a native 32-bit kernel. It's doubtful that rolling your own single loop actually performs better than just calling strlen and

Re: [PATCH -mm v2 2/2] coredump: add a new elf note with siginfo of the signal

2012-09-18 Thread Roland McGrath
> But, somehow I forgot about compat tasks when we discussed this before. > Perhaps the code above should do > > if (is_compat_task()) > copy_siginfo_to_user32(...); > else > copy_siginfo_to_user(...); > > ? compat_binfmt_elf.c will define a separate copy

Re: [PATCH -mm v2 2/2] coredump: add a new elf note with siginfo of the signal

2012-09-18 Thread Roland McGrath
But, somehow I forgot about compat tasks when we discussed this before. Perhaps the code above should do if (is_compat_task()) copy_siginfo_to_user32(...); else copy_siginfo_to_user(...); ? compat_binfmt_elf.c will define a separate copy of this

Re: [PATCH -mm v2] coredump: extend core dump note section to contain file names of mapped files

2012-09-18 Thread Roland McGrath
The code needs to be macroized a bit so that compat_binfmt_elf.c will produce a version that encodes 32-bit values correctly so as to be compatible with the output of a native 32-bit kernel. It's doubtful that rolling your own single loop actually performs better than just calling strlen and

Re: [PATCH 2/2] coredump: add a new elf note with siginfo fields of the signal

2012-09-14 Thread Roland McGrath
Other ELF notes have per-machine layouts too. It's far more important to reduce the total number of ways we have to represent the same information. On a given machine, we already have a layout and we don't want another. Debuggers and so forth already know how to handle the per-machine layouts.

Re: [PATCH 2/2] coredump: add a new elf note with siginfo fields of the signal

2012-09-14 Thread Roland McGrath
Other ELF notes have per-machine layouts too. It's far more important to reduce the total number of ways we have to represent the same information. On a given machine, we already have a layout and we don't want another. Debuggers and so forth already know how to handle the per-machine layouts.

Re: [PATCH 2/2] coredump: add a new elf note with siginfo fields of the signal

2012-09-13 Thread Roland McGrath
I agree with Oleg. If there is an NT_SIGINFO note, it should contain exactly the siginfo_t layout and data that we otherwise expose to userland already. That is, it must match what PTRACE_GETSIGINFO reports, which (I think) also matches exactly what appears on the stack for a signal delivery.

Re: [PATCH 2/2] coredump: add a new elf note with siginfo fields of the signal

2012-09-13 Thread Roland McGrath
I agree with Oleg. If there is an NT_SIGINFO note, it should contain exactly the siginfo_t layout and data that we otherwise expose to userland already. That is, it must match what PTRACE_GETSIGINFO reports, which (I think) also matches exactly what appears on the stack for a signal delivery.

Re: [bug] uml doesn't boot under 2.6.25-rc1 host (was Re: 2.6.24-mm1 bugs)

2008-02-21 Thread Roland McGrath
Thanks for the pointers, guys. It took a while for me to figure out what got wrong to foul up UML, but the bug and fix are trivial (posting now). Some of the testing I thought had got done clearly wasn't done, since PTRACE_SETREGS was 100% busticated for 32-bit processes calling ptrace on x86_64

[PATCH] x86 ptrace: fix compat PTRACE_SETREGS

2008-02-21 Thread Roland McGrath
Simple typo fix for regression introduced by the user_regset changes. Signed-off-by: Roland McGrath <[EMAIL PROTECTED]> --- arch/x86/kernel/ptrace.c |4 ++-- 1 files changed, 2 insertions(+), 2 deletions(-) diff --git a/arch/x86/kernel/ptrace.c b/arch/x86/kernel/ptrace.c index 7

Re: [patch 1/2] x86, ptrace: support pebs in ds.c

2008-02-21 Thread Roland McGrath
Sorry I haven't replied in this thread sooner. I would like to see all the BTS and DS work wait until after 2.6.25. We have a lot of x86 churn in 2.6.25 already, and I think we'd do better without adding this wrinkle at the same time. The low-level implementation pieces should gel a bit more in

Re: [patch 1/2] x86, ptrace: support pebs in ds.c

2008-02-21 Thread Roland McGrath
Sorry I haven't replied in this thread sooner. I would like to see all the BTS and DS work wait until after 2.6.25. We have a lot of x86 churn in 2.6.25 already, and I think we'd do better without adding this wrinkle at the same time. The low-level implementation pieces should gel a bit more in

[PATCH] x86 ptrace: fix compat PTRACE_SETREGS

2008-02-21 Thread Roland McGrath
Simple typo fix for regression introduced by the user_regset changes. Signed-off-by: Roland McGrath [EMAIL PROTECTED] --- arch/x86/kernel/ptrace.c |4 ++-- 1 files changed, 2 insertions(+), 2 deletions(-) diff --git a/arch/x86/kernel/ptrace.c b/arch/x86/kernel/ptrace.c index 702c33e

Re: [bug] uml doesn't boot under 2.6.25-rc1 host (was Re: 2.6.24-mm1 bugs)

2008-02-21 Thread Roland McGrath
Thanks for the pointers, guys. It took a while for me to figure out what got wrong to foul up UML, but the bug and fix are trivial (posting now). Some of the testing I thought had got done clearly wasn't done, since PTRACE_SETREGS was 100% busticated for 32-bit processes calling ptrace on x86_64

include/asm-x86/desc_64.h is empty

2008-02-20 Thread Roland McGrath
include/asm-x86/desc_64.h should have been removed, but is still in the tree containing just a newline. Thanks, Roland -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at

Re: [PATCH 1/5] signal(x86_32): Improve the signal stack overflow check

2008-02-20 Thread Roland McGrath
> I've been looking at that, at the same time a bunch of ia32/signal.c > looks like it can go away. Yes, I meant the 3 into 1 unification. Thanks, Roland -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info

Re: [PATCH 1/5] signal(x86_32): Improve the signal stack overflow check

2008-02-20 Thread Roland McGrath
I've been looking at that, at the same time a bunch of ia32/signal.c looks like it can go away. Yes, I meant the 3 into 1 unification. Thanks, Roland -- To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More majordomo info at

include/asm-x86/desc_64.h is empty

2008-02-20 Thread Roland McGrath
include/asm-x86/desc_64.h should have been removed, but is still in the tree containing just a newline. Thanks, Roland -- To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More majordomo info at

Re: [PATCH 1/5] signal(x86_32): Improve the signal stack overflow check

2008-02-19 Thread Roland McGrath
> I spent some time read you mail carefully and dig into the code again. > > And yes, you are right. It's possible that SA_ONSTACK has been cleared > before the second signal on the same stack comes. It's not necessary for SA_ONSTACK to have "been cleared", by which I assume you mean a sigaction

Re: [PATCH 1/5] signal(x86_32): Improve the signal stack overflow check

2008-02-19 Thread Roland McGrath
> You mean the comment? No, that is trivial and already corrected. I mean the substance of your most recent patch. I described why I think it is wrong. You did not respond. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED]

Re: [PATCH 1/5] signal(x86_32): Improve the signal stack overflow check

2008-02-19 Thread Roland McGrath
> > Please elaborate on the rationale that justifies this change. > > I don't see it at all. > > I have corrected the comment in the latest patch which has been apllied by > Ingo. > Please refer to http://lkml.org/lkml/2008/2/18/575 and > http://lkml.org/lkml/2008/2/19/119 . You have yet to

Re: [PATCH 1/5] signal(x86_32): Improve the signal stack overflow check

2008-02-19 Thread Roland McGrath
> These patches change the behaviour of programs that longjmp out of a > signal handler on an alternate stack, don't they? No, they don't. Shi Weihua's original patch had that problem. Thanks, Roland -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a

Re: [PATCH 1/5] signal(x86_32): Improve the signal stack overflow check

2008-02-19 Thread Roland McGrath
> Shouldn't such programs use sigsetjmp/siglongjmp, which should reset the > signal stack state? That is not really related. The distinction doesn't really exist for programs using the normal API (setjmp is sigsetjmp(,1)). What siglongjmp guarantees handled is signal mask changes, not

Re: [PATCH 1/5] signal(x86_32): Improve the signal stack overflow check

2008-02-19 Thread Roland McGrath
This change looks bogus to me. Before I get to the content, there is a nit that annoys me. You changed the punctuation in my comment so that it no longer means what it did, and now the comment is nonsensical. I don't demand decent English from hackers of any linguistic bent, but please don't

Re: [PATCH 1/5] signal(x86_32): Improve the signal stack overflow check

2008-02-19 Thread Roland McGrath
This change looks bogus to me. Before I get to the content, there is a nit that annoys me. You changed the punctuation in my comment so that it no longer means what it did, and now the comment is nonsensical. I don't demand decent English from hackers of any linguistic bent, but please don't

Re: [PATCH 1/5] signal(x86_32): Improve the signal stack overflow check

2008-02-19 Thread Roland McGrath
Shouldn't such programs use sigsetjmp/siglongjmp, which should reset the signal stack state? That is not really related. The distinction doesn't really exist for programs using the normal API (setjmp is sigsetjmp(,1)). What siglongjmp guarantees handled is signal mask changes, not

Re: [PATCH 1/5] signal(x86_32): Improve the signal stack overflow check

2008-02-19 Thread Roland McGrath
These patches change the behaviour of programs that longjmp out of a signal handler on an alternate stack, don't they? No, they don't. Shi Weihua's original patch had that problem. Thanks, Roland -- To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a

Re: [PATCH 1/5] signal(x86_32): Improve the signal stack overflow check

2008-02-19 Thread Roland McGrath
Please elaborate on the rationale that justifies this change. I don't see it at all. I have corrected the comment in the latest patch which has been apllied by Ingo. Please refer to http://lkml.org/lkml/2008/2/18/575 and http://lkml.org/lkml/2008/2/19/119 . You have yet to say

Re: [PATCH 1/5] signal(x86_32): Improve the signal stack overflow check

2008-02-19 Thread Roland McGrath
You mean the comment? No, that is trivial and already corrected. I mean the substance of your most recent patch. I described why I think it is wrong. You did not respond. -- To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED]

Re: [PATCH 1/5] signal(x86_32): Improve the signal stack overflow check

2008-02-19 Thread Roland McGrath
I spent some time read you mail carefully and dig into the code again. And yes, you are right. It's possible that SA_ONSTACK has been cleared before the second signal on the same stack comes. It's not necessary for SA_ONSTACK to have been cleared, by which I assume you mean a sigaction call

Re: Compiling with 2.6.25-rc2 with binutils 2.17 fails?

2008-02-18 Thread Roland McGrath
> > > sed -n -e 's/^00*/0/' -e 's/^\([0-9a-fA-F]*\) . \(VDSO[a-zA-Z0-9_]*\)$/ = > > > 0x;/p' | LC_ALL=C sort > arch/x86/vdso/vdso32-sysenter-syms.lds > > > > Also show me the vdso32-sysenter-syms.lds file. > > Attached. The contents of this file are fine. If all the vdso32-*-syms.lds files look

Re: Compiling with 2.6.25-rc2 with binutils 2.17 fails?

2008-02-18 Thread Roland McGrath
> I'm poking at it. Something in my cross compiling setup is driving this bit > screwy: > > i686-nm arch/x86/vdso/vdso32-sysenter.so.dbg | Show me the output of just this. > sed -n -e 's/^00*/0/' -e 's/^\([0-9a-fA-F]*\) . \(VDSO[a-zA-Z0-9_]*\)$/ = > 0x;/p' | LC_ALL=C sort >

Re: Compiling with 2.6.25-rc2 with binutils 2.17 fails?

2008-02-18 Thread Roland McGrath
I'm poking at it. Something in my cross compiling setup is driving this bit screwy: i686-nm arch/x86/vdso/vdso32-sysenter.so.dbg | Show me the output of just this. sed -n -e 's/^00*/0/' -e 's/^\([0-9a-fA-F]*\) . \(VDSO[a-zA-Z0-9_]*\)$/ = 0x;/p' | LC_ALL=C sort

Re: Compiling with 2.6.25-rc2 with binutils 2.17 fails?

2008-02-18 Thread Roland McGrath
sed -n -e 's/^00*/0/' -e 's/^\([0-9a-fA-F]*\) . \(VDSO[a-zA-Z0-9_]*\)$/ = 0x;/p' | LC_ALL=C sort arch/x86/vdso/vdso32-sysenter-syms.lds Also show me the vdso32-sysenter-syms.lds file. Attached. The contents of this file are fine. If all the vdso32-*-syms.lds files look sane, then

Re: Compiling with 2.6.25-rc2 with binutils 2.17 fails?

2008-02-17 Thread Roland McGrath
> Still trying to track down why, but it works on a toolchain built from > binutils 2.18 and gcc 4.1.3, but not with a toolchain from binutils 2.17 and > gcc 4.1.2. And considering where it's failing... I don't think the vdso magic should require so new a binutils. Please try to figure out

Re: Compiling with 2.6.25-rc2 with binutils 2.17 fails?

2008-02-17 Thread Roland McGrath
Still trying to track down why, but it works on a toolchain built from binutils 2.18 and gcc 4.1.3, but not with a toolchain from binutils 2.17 and gcc 4.1.2. And considering where it's failing... I don't think the vdso magic should require so new a binutils. Please try to figure out which

Re: 2.6.25-rc2 vdso_install breaks user "make install"

2008-02-15 Thread Roland McGrath
Perhaps it makes more sense to have vdso_install be a dependency of modules_install rather than install, since they both put things in /lib/modules. The installed vdso images are potentially useful for a kernel when you aren't bothering to build or install any modules, but those images are only

Re: 2.6.25-rc2 vdso_install breaks user make install

2008-02-15 Thread Roland McGrath
Perhaps it makes more sense to have vdso_install be a dependency of modules_install rather than install, since they both put things in /lib/modules. The installed vdso images are potentially useful for a kernel when you aren't bothering to build or install any modules, but those images are only

Re: [PATCH] samples: build fix

2008-02-14 Thread Roland McGrath
I don't have any axe to grind here, I just could not figure out how to get the samples/ modules built (without resorting to make M=.../samples/foo and clobbering my source directory). If there is another plan, point me to its documentation. I can't see the point of the Kconfig option for samples

Re: [PATCH] samples: build fix

2008-02-14 Thread Roland McGrath
> Sam, is this ok with the samples intent ? I think as long as we do not > include them with the kernel image and have a "make samples" to build > them, it's ok. Having them built upon make modules seems like a good > idea to me. I"m not sure what you mean by "with the kernel image". AFAICT,

Re: [PATCH] samples: build fix

2008-02-14 Thread Roland McGrath
Sam, is this ok with the samples intent ? I think as long as we do not include them with the kernel image and have a make samples to build them, it's ok. Having them built upon make modules seems like a good idea to me. Im not sure what you mean by with the kernel image. AFAICT, everything

Re: [PATCH] samples: build fix

2008-02-14 Thread Roland McGrath
I don't have any axe to grind here, I just could not figure out how to get the samples/ modules built (without resorting to make M=.../samples/foo and clobbering my source directory). If there is another plan, point me to its documentation. I can't see the point of the Kconfig option for samples

[PATCH] samples: build fix

2008-02-13 Thread Roland McGrath
-$(CONFIG_SAMPLES) because there is no other conditional like that in the top-level Makefile and samples/Makefile already uses obj-$(CONFIG_SAMPLES) as if it expects always to be included. Signed-off-by: Roland McGrath <[EMAIL PROTECTED]> --- Makefile |5 + 1 files changed, 1 insertions

Re: [2.6 patch] x86: make mxcsr_feature_mask static again

2008-02-13 Thread Roland McGrath
Good change. Making it global was needed temporarily in between some of the i387 unification patches, but is unnecessary after the final merge. Thanks, Roland -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo

Re: [2.6 patch] x86: make mxcsr_feature_mask static again

2008-02-13 Thread Roland McGrath
Good change. Making it global was needed temporarily in between some of the i387 unification patches, but is unnecessary after the final merge. Thanks, Roland -- To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More majordomo

[PATCH] samples: build fix

2008-02-13 Thread Roland McGrath
-$(CONFIG_SAMPLES) because there is no other conditional like that in the top-level Makefile and samples/Makefile already uses obj-$(CONFIG_SAMPLES) as if it expects always to be included. Signed-off-by: Roland McGrath [EMAIL PROTECTED] --- Makefile |5 + 1 files changed, 1 insertions(+), 4

Re: [git pull] kgdb-light -v9

2008-02-12 Thread Roland McGrath
> You silently overwrite any user ptrace hw breakpoints right? To do it cleanly > would still require a reservation frame work. There was work underway on that before (hw_breakpoint). I'm not entirely sure you want to use fancy stuff like that in kgdb. It's nice for kgdb to be as

Re: [git pull] kgdb-light -v9

2008-02-12 Thread Roland McGrath
You silently overwrite any user ptrace hw breakpoints right? To do it cleanly would still require a reservation frame work. There was work underway on that before (hw_breakpoint). I'm not entirely sure you want to use fancy stuff like that in kgdb. It's nice for kgdb to be as self-contained

Re: 2.6.25-rc1, weird build error

2008-02-11 Thread Roland McGrath
> > * Roland McGrath <[EMAIL PROTECTED]> wrote: > > > > LD init/built-in.o > > > distcc[12023] ERROR: compile (null) on localhost failed > > > make: *** [vmlinux.o] Error 1 > > > > That message sure looks to me like it could only

Re: 2.6.25-rc1, weird build error

2008-02-11 Thread Roland McGrath
> LD init/built-in.o > distcc[12023] ERROR: compile (null) on localhost failed > make: *** [vmlinux.o] Error 1 That message sure looks to me like it could only be a distcc bug. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL

Re: REGRESSION: x86 vDSO: remove vdso-syms.o

2008-02-11 Thread Roland McGrath
I did not see it with your .config either. > This fails with clean build. And vdso-syms.lds is not empty. > > Contents of ?arch/x86/vdso/vdso-syms.lds: > VDSO64_PRELINK = 0xff70; > VDSO64_jiffies = 0xff7004b8; Odd. The missing symbols come from the same place that

Re: REGRESSION: x86 vDSO: remove vdso-syms.o

2008-02-11 Thread Roland McGrath
Sam might want to experiment with something like: stdout_target = $(1) > $(@D)/.tmp_$(@F) && mv -f $(@D)/.tmp_$(@F) $@ cmd_foo = $(call stdout_target,blah | sed s/foo/bar/) to clean up all the places that would benefit from robust treatment for output files vs interrupted/erring

Re: REGRESSION: x86 vDSO: remove vdso-syms.o

2008-02-11 Thread Roland McGrath
> if that file is empty, it might be the effect of a Ctrl-C. I sometimes > get that on .o files, if i Ctrl-C a highly parallel make -j at the wrong > moment. (is this expected behavior? It's been like this for a long > time.) It is the known situation with the compiler since the dawn of time,

Re: REGRESSION: x86 vDSO: remove vdso-syms.o

2008-02-11 Thread Roland McGrath
I was not able to reproduce this failure. Those symbols should be defined by arch/x86/vdso/vdso-syms.lds, a file generated by the build. If that file is empty in your build, remove it and see if it gets regenerated properly, or try a clean build. If the problem persists, please send me your

[PATCH 2.6.25] x86: vdso_install fix

2008-02-11 Thread Roland McGrath
The makefile magic for installing the 32-bit vdso images on disk had a little error. Only one line of change would fix that bug. This does a little more to reduce the error-prone duplication of this bit of makefile variable magic. Signed-off-by: Roland McGrath <[EMAIL PROTECTED]> --- ar

Re: REGRESSION: x86 vDSO: remove vdso-syms.o

2008-02-11 Thread Roland McGrath
I was not able to reproduce this failure. Those symbols should be defined by arch/x86/vdso/vdso-syms.lds, a file generated by the build. If that file is empty in your build, remove it and see if it gets regenerated properly, or try a clean build. If the problem persists, please send me your

[PATCH 2.6.25] x86: vdso_install fix

2008-02-11 Thread Roland McGrath
The makefile magic for installing the 32-bit vdso images on disk had a little error. Only one line of change would fix that bug. This does a little more to reduce the error-prone duplication of this bit of makefile variable magic. Signed-off-by: Roland McGrath [EMAIL PROTECTED] --- arch/x86

Re: REGRESSION: x86 vDSO: remove vdso-syms.o

2008-02-11 Thread Roland McGrath
Sam might want to experiment with something like: stdout_target = $(1) $(@D)/.tmp_$(@F) mv -f $(@D)/.tmp_$(@F) $@ cmd_foo = $(call stdout_target,blah | sed s/foo/bar/) to clean up all the places that would benefit from robust treatment for output files vs interrupted/erring

Re: REGRESSION: x86 vDSO: remove vdso-syms.o

2008-02-11 Thread Roland McGrath
if that file is empty, it might be the effect of a Ctrl-C. I sometimes get that on .o files, if i Ctrl-C a highly parallel make -j at the wrong moment. (is this expected behavior? It's been like this for a long time.) It is the known situation with the compiler since the dawn of time, yes.

Re: 2.6.25-rc1, weird build error

2008-02-11 Thread Roland McGrath
LD init/built-in.o distcc[12023] ERROR: compile (null) on localhost failed make: *** [vmlinux.o] Error 1 That message sure looks to me like it could only be a distcc bug. -- To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL

Re: REGRESSION: x86 vDSO: remove vdso-syms.o

2008-02-11 Thread Roland McGrath
I did not see it with your .config either. This fails with clean build. And vdso-syms.lds is not empty. Contents of ?arch/x86/vdso/vdso-syms.lds: VDSO64_PRELINK = 0xff70; VDSO64_jiffies = 0xff7004b8; Odd. The missing symbols come from the same place that VDSO64_jiffies

Re: 2.6.25-rc1, weird build error

2008-02-11 Thread Roland McGrath
* Roland McGrath [EMAIL PROTECTED] wrote: LD init/built-in.o distcc[12023] ERROR: compile (null) on localhost failed make: *** [vmlinux.o] Error 1 That message sure looks to me like it could only be a distcc bug. ok - but it never occured before. Maye it's just

Re: [PATCH] x86_64: make traps on 'iret' be debuggable in user space

2008-02-07 Thread Roland McGrath
It sure didn't look to me like paravirt probably worked. But what do I know? -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at

Re: [PATCH] x86_64: make traps on 'iret' be debuggable in user space

2008-02-07 Thread Roland McGrath
> Did you test without CONFIG_PARAVIRT, and CONFIG_PARAVIRT booted both with and > without the "noreplace-paravirt" parameter? I did not test CONFIG_PARAVIRT at all. I just fixed what its introduction had done to break generic x86-64. Thanks, Roland -- To unsubscribe from this list: send the

Re: [PATCH] x86_64: make traps on 'iret' be debuggable in user space

2008-02-07 Thread Roland McGrath
Did you test without CONFIG_PARAVIRT, and CONFIG_PARAVIRT booted both with and without the noreplace-paravirt parameter? I did not test CONFIG_PARAVIRT at all. I just fixed what its introduction had done to break generic x86-64. Thanks, Roland -- To unsubscribe from this list: send the line

Re: [PATCH] x86_64: make traps on 'iret' be debuggable in user space

2008-02-07 Thread Roland McGrath
It sure didn't look to me like paravirt probably worked. But what do I know? -- To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at

Re: [PATCH] x86_64: make traps on 'iret' be debuggable in user space

2008-02-05 Thread Roland McGrath
> thanks, applied. I suppose you have a testcase for this that we could try? This should exit 0 and show "wait status 0xb7f", and does on i386. On 2.6.24 it exits 1 and shows "wait status 0xb". Note, on the current tree before [PATCH] x86_64: fix iret exception recovery that I also posted today,

Re: [PATCH] x86_64: make traps on 'iret' be debuggable in user space

2008-02-05 Thread Roland McGrath
> > thanks, applied. I suppose you have a testcase for this that we could try? > > This should exit 0 and show "wait status 0xb7f", and does on i386. > On 2.6.24 it exits 1 and shows "wait status 0xb". To clarify, build the case with -m32 but run on x86_64. Thanks, Roland -- To unsubscribe

Re: [PATCH] x86_64: make traps on 'iret' be debuggable in user space

2008-02-05 Thread Roland McGrath
thanks, applied. I suppose you have a testcase for this that we could try? This should exit 0 and show wait status 0xb7f, and does on i386. On 2.6.24 it exits 1 and shows wait status 0xb. Note, on the current tree before [PATCH] x86_64: fix iret exception recovery that I also posted today, this

Re: [PATCH] x86_64: make traps on 'iret' be debuggable in user space

2008-02-05 Thread Roland McGrath
thanks, applied. I suppose you have a testcase for this that we could try? This should exit 0 and show wait status 0xb7f, and does on i386. On 2.6.24 it exits 1 and shows wait status 0xb. To clarify, build the case with -m32 but run on x86_64. Thanks, Roland -- To unsubscribe from this

[PATCH] x86_64: make traps on 'iret' be debuggable in user space

2008-02-04 Thread Roland McGrath
Date: Fri Apr 29 09:38:44 2005 -0700 x86: make traps on 'iret' be debuggable in user space Signed-off-by: Roland McGrath <[EMAIL PROTECTED]> --- arch/x86/kernel/entry_64.S | 25 +++-- 1 files changed, 19 insertions(+), 6 deletions(-) diff --git a/arc

[PATCH] x86_64: fix iret exception recovery

2008-02-04 Thread Roland McGrath
hat use, anyone exercising the minimum of attention to detail expected of anyone touching this subtle code would realize it needed to change as well. Signed-off-by: Roland McGrath <[EMAIL PROTECTED]> --- arch/x86/kernel/entry_64.S |3 +-- 1 files changed, 1 insertions(+), 2 deletions(

[PATCH] x86 ptrace: disallow null cs/ss

2008-02-04 Thread Roland McGrath
this subtlety from being overlooked again. Signed-off-by: Roland McGrath <[EMAIL PROTECTED]> --- arch/x86/kernel/ptrace.c | 25 +++-- 1 files changed, 23 insertions(+), 2 deletions(-) diff --git a/arch/x86/kernel/ptrace.c b/arch/x86/kernel/ptrace.c index 96286df..702c33e

[PATCH] x86 ptrace: disallow null cs/ss

2008-02-04 Thread Roland McGrath
this subtlety from being overlooked again. Signed-off-by: Roland McGrath [EMAIL PROTECTED] --- arch/x86/kernel/ptrace.c | 25 +++-- 1 files changed, 23 insertions(+), 2 deletions(-) diff --git a/arch/x86/kernel/ptrace.c b/arch/x86/kernel/ptrace.c index 96286df..702c33e 100644

[PATCH] x86_64: make traps on 'iret' be debuggable in user space

2008-02-04 Thread Roland McGrath
: Fri Apr 29 09:38:44 2005 -0700 x86: make traps on 'iret' be debuggable in user space Signed-off-by: Roland McGrath [EMAIL PROTECTED] --- arch/x86/kernel/entry_64.S | 25 +++-- 1 files changed, 19 insertions(+), 6 deletions(-) diff --git a/arch/x86/kernel/entry_64

[PATCH] x86_64: fix iret exception recovery

2008-02-04 Thread Roland McGrath
the minimum of attention to detail expected of anyone touching this subtle code would realize it needed to change as well. Signed-off-by: Roland McGrath [EMAIL PROTECTED] --- arch/x86/kernel/entry_64.S |3 +-- 1 files changed, 1 insertions(+), 2 deletions(-) diff --git a/arch/x86/kernel/entry_64.S

Re: ptrace API extensions for BTS

2008-01-29 Thread Roland McGrath
Sorry I did not get more into this discussion earlier. I still have not read through all of the email threads. But I have looked over the current version of your code now in -mm. I think this work has a great deal of overlap with the perfmon2 project. There are two facets that overlap, which

Re: ptrace API extensions for BTS

2008-01-29 Thread Roland McGrath
Sorry I did not get more into this discussion earlier. I still have not read through all of the email threads. But I have looked over the current version of your code now in -mm. I think this work has a great deal of overlap with the perfmon2 project. There are two facets that overlap, which

Re: [PATCH x86/mm] x86: i387 fpregs_set convert_to_fxsr

2008-01-25 Thread Roland McGrath
> On Thu, Jan 24, 2008 at 05:59:33PM -0800, Roland McGrath wrote: > > + if (pos > 0 || count < sizeof(env)) > > + convert_from_fxsr(, target); > > Well, is the generic regset code enforce the need for this now? Can we > disallow the usage cases where

Re: [PATCH x86/mm] x86: i387 fpregs_set convert_to_fxsr

2008-01-25 Thread Roland McGrath
On Thu, Jan 24, 2008 at 05:59:33PM -0800, Roland McGrath wrote: + if (pos 0 || count sizeof(env)) + convert_from_fxsr(env, target); Well, is the generic regset code enforce the need for this now? Can we disallow the usage cases where the user passes smaller target buffer

[PATCH x86/mm] x86: i387 fpregs_set convert_to_fxsr

2008-01-24 Thread Roland McGrath
-by: Suresh Siddha <[EMAIL PROTECTED]> Signed-off-by: Roland McGrath <[EMAIL PROTECTED]> --- arch/x86/kernel/i387.c | 12 ++-- 1 files changed, 6 insertions(+), 6 deletions(-) diff --git a/arch/x86/kernel/i387.c b/arch/x86/kernel/i387.c index 7e354a3..26719bd 100644 --- a/arch/x86/k

[PATCH x86/mm] x86: i387 fpregs_set convert_to_fxsr

2008-01-24 Thread Roland McGrath
-by: Suresh Siddha [EMAIL PROTECTED] Signed-off-by: Roland McGrath [EMAIL PROTECTED] --- arch/x86/kernel/i387.c | 12 ++-- 1 files changed, 6 insertions(+), 6 deletions(-) diff --git a/arch/x86/kernel/i387.c b/arch/x86/kernel/i387.c index 7e354a3..26719bd 100644 --- a/arch/x86/kernel/i387.c +++ b

Re: [RFC] Per-thread getrusage

2008-01-18 Thread Roland McGrath
I agree that RUSAGE_THREAD is fine. (In fact, if you'd pressed me to remember without looking, I would have assumed we put it in already.) However, in the implementation, I would keep it cleaner by moving the identical code from inside the loop under case RUSAGE_SELF into a shared subfunction,

[PATCH] RUSAGE_THREAD

2008-01-18 Thread Roland McGrath
This adds the RUSAGE_THREAD option for the getrusage system call. Solaris calls this RUSAGE_LWP and uses the same value (1). That name is not a natural one for Linux, but we keep it as an alias. Signed-off-by: Roland McGrath <[EMAIL PROTECTED]> --- include/linux/resource.h |2 ++

Re: x86: kdump failure

2008-01-18 Thread Roland McGrath
Oops, I overlooked the use of elf_core_copy_regs in kernel/kexec.c. It is certainly safe and fine to reintroduce the old macro. Everything removed in the "x86 user_regset cleanup" patch is purely removing code and it doesn't hurt to have it back (it's just all unused except for this kexec nit).

Re: x86: kdump failure

2008-01-18 Thread Roland McGrath
Oops, I overlooked the use of elf_core_copy_regs in kernel/kexec.c. It is certainly safe and fine to reintroduce the old macro. Everything removed in the x86 user_regset cleanup patch is purely removing code and it doesn't hurt to have it back (it's just all unused except for this kexec nit).

  1   2   3   4   5   6   7   8   9   10   >