From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754527AbZIPBvn (ORCPT ); Tue, 15 Sep 2009 21:51:43 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1753932AbZIPBvi (ORCPT ); Tue, 15 Sep 2009 21:51:38 -0400 Received: from mga14.intel.com ([143.182.124.37]:51194 "EHLO mga14.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752243AbZIPBvg (ORCPT ); Tue, 15 Sep 2009 21:51:36 -0400 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="4.44,394,1249282800"; d="scan'208";a="188088266" Message-Id: <20090916013939.656308742@intel.com> User-Agent: quilt/0.46-1 Date: Wed, 16 Sep 2009 09:39:39 +0800 From: Wu Fengguang To: Andrew Morton To: KAMEZAWA Hiroyuki CC: Benjamin Herrenschmidt CC: Christoph Lameter CC: Ingo Molnar CC: Tejun Heo CC: Nick Piggin Cc: Wu Fengguang , LKML , linux-mm@kvack.org Subject: [PATCH 0/3] /proc/kmem fixes and hwpoison bits v2 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Andrew and Kame, Here are the 3 updated bug fix/cleanup patches for kmem. Comments are welcome. Changes since v1: - change vread()/vwrite() prototype (proposed by Kame) - include Kame's is_vmalloc_or_module_addr() check and use Hugh's -ENXIO. - I decided not to use __GFP_ZERO, since the buf will be reused in the loop, so it would be better for vread to zero-fill it each time. - removed the hwpoison checks for vmalloc pages. It seems that vread/vwrite could be simplified to handle one single page, and the hwpoison bits can be considered after that. Thanks, Fengguang --