lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Tue, 29 Mar 2011 10:41:07 +0100
From:	Maxin John <maxin.john@...il.com>
To:	Daniel Baluta <dbaluta@...acom.com>
Cc:	Heiko Carstens <heiko.carstens@...ibm.com>, rdunlap@...otime.net,
	catalin.marinas@....com, linux-doc@...r.kernel.org,
	linux-kernel@...r.kernel.org
Subject: Re: [PATCH] kmemleak: update documentation

Hi,

With some minor modifications, I was able to run kmemleak in MIPS platform.
Kmemleak output and Patch are available in this link:

https://lkml.org/lkml/2011/3/28/483

Should we include that information in the Documentation ?

Warm Regards,
Maxin B. John

On Tue, Mar 29, 2011 at 8:51 AM, Daniel Baluta <dbaluta@...acom.com> wrote:
>>> +Kmemleak is supported on x86, arm, powerpc, sparc, sh, microblaze and tile.
>>
>> You missed s390.
>
> You are right.
>
> Randy, should I send a v2 of this patch, or is it already applied?
> Another option would be to send a separate patch adding s390,
> on top of my previous patch.
>
> thanks,
> Daniel.
> --
> To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
> the body of a message to majordomo@...r.kernel.org
> More majordomo info at  http://vger.kernel.org/majordomo-info.html
> Please read the FAQ at  http://www.tux.org/lkml/
>
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ