The patch titled libata: expose AN to user space has been added to the -mm tree. Its filename is libata-expose-an-to-user-space.patch *** Remember to use Documentation/SubmitChecklist when testing your code *** See http://www.zip.com.au/~akpm/linux/patches/stuff/added-to-mm.txt to find out what to do about this ------------------------------------------------------ Subject: libata: expose AN to user space From: Kristen Carlson Accardi <kristen.c.accardi@xxxxxxxxx> If Asynchronous Notification of media change events is supported, pass that information up to the SCSI layer. Signed-off-by: Kristen Carlson Accardi <kristen.c.accardi@xxxxxxxxx> Signed-off-by: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx> --- drivers/ata/libata-scsi.c | 3 +++ 1 file changed, 3 insertions(+) diff -puN drivers/ata/libata-scsi.c~libata-expose-an-to-user-space drivers/ata/libata-scsi.c --- a/drivers/ata/libata-scsi.c~libata-expose-an-to-user-space +++ a/drivers/ata/libata-scsi.c @@ -899,6 +899,9 @@ static void ata_scsi_dev_config(struct s blk_queue_max_hw_segments(q, q->max_hw_segments - 1); } + if (dev->flags & ATA_DFLAG_AN) + sdev->media_change_notify = 1; + if (dev->flags & ATA_DFLAG_NCQ) { int depth; _ Patches currently in -mm which might be from kristen.c.accardi@xxxxxxxxx are origin.patch acpi-dock-cleanup-the-uid-patch.patch acpi-dock-fix-opps-after-dock-driver-fails-to-initialize.patch acpi-dock-use-dynamically-allocated-platform-device.patch acpi-dock-add-immediate_undock-option.patch acpi-dock-unsuppress-uevents.patch acpi-dock-send-envp-with-uevent.patch acpi-bay-unsuppress-uevents.patch libata-check-for-an-support.patch genhd-expose-an-to-user-space.patch scsi-expose-an-to-user-space.patch libata-expose-an-to-user-space.patch genhd-send-async-notification-on-media-change.patch scsi-save-disk-in-scsi_device.patch libata-send-event-when-an-received.patch cpci_hotplug-convert-to-use-the-kthread-api.patch - To unsubscribe from this list: send the line "unsubscribe mm-commits" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html