lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20071026223942.6dbfebe0@hyperion.delvare> Date: Fri, 26 Oct 2007 22:39:42 +0200 From: Jean Delvare <khali@...ux-fr.org> To: Bjorn Helgaas <bjorn.helgaas@...com> Cc: trenn@...e.de, linux-acpi <linux-acpi@...r.kernel.org>, linux-kernel <linux-kernel@...r.kernel.org>, Len Brown <lenb@...nel.org>, Andrew Morton <akpm@...l.org> Subject: Re: [PATCH 0/5] Detect hwmon and i2c bus drivers interfering with ACPI Operation Region resources Hi Bjorn, On Fri, 26 Oct 2007 07:09:19 -0600, Bjorn Helgaas wrote: > On Friday 26 October 2007 4:45:20 am Thomas Renninger wrote: > > Maybe the list set up by this patch set should be similarly exported > > like /proc/ioports /proc/iomem > > to where ever appropriate (maybe /sys/devices/system/acpi/opreg_io > > and /sys/devices/system/acpi/opreg_mem?) to get a better overview what > > kind of devices are served by the Op regions on different machines. > > I want to try hard to avoid making ACPI a special case in this way. > The current /proc/io{ports,mem} contains reservations for everything > else. I'd hate to have to look two places just because of ACPI. I agree. I consider the patches Thomas and myself just posted as a temporary workaround (even though we can't say how long this "temporary" will last). Ideally, we should register the I/O ports declared in ACPI OpRegions - just not now as it would break too many drivers. Time we tell how "clean" we manage to go. -- Jean Delvare - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists