lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 28 Apr 2008 10:18:54 +0530
From:	"K. Prasad" <prasad@...ux.vnet.ibm.com>
To:	Michael Ellerman <michael@...erman.id.au>
Cc:	prasad@...ux.vnet.ibm.com, dwilder@...ibm.com,
	linux-kernel@...r.kernel.org, mathieu.desnoyers@...ymtl.ca,
	hunt@...hat.com, dave@...ux.vnet.ibm.com
Subject: Re: [RFC Patch 1/1] debugfs_printk and debugfs_dump interface

On Mon, Apr 28, 2008 at 10:50:51AM +1000, Michael Ellerman wrote:
> On Fri, 2008-04-25 at 13:49 +0530, K. Prasad wrote:
> > On Fri, Apr 25, 2008 at 01:12:00PM +0530, K. Prasad wrote:
> > > Please find the new patch below.
> > > > 
> > Let the email slip through a little early. Please find the revised
> > patch below.
> > 
> > Thanks,
> > K.Prasad
> > 
> > This patch introduces two new interfaces called debugfs_printk and 
> > debugfs_dump which can be used to print to the debugfs mount directly.
> > It uses the 'trace' infrastructure underneath and is a patch over it.
> > A sample file is also created to demonstrate its ease of use.
> 
> I still think debugfs_printk() is not the right name, as it is not part
> of the existing family of debugfs_* routines.
Whether to call it trace_printk() and trace_dump() is a suggestion I
would like to ask David Wilder (and others). Let me know if you think
there are better names.

Thanks,
K.Prasad

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ