lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20260116021835.71770-1-sj@kernel.org>
Date: Thu, 15 Jan 2026 18:18:34 -0800
From: SeongJae Park <sj@...nel.org>
To: Suren Baghdasaryan <surenb@...gle.com>
Cc: SeongJae Park <sj@...nel.org>,
	Matthew Wilcox <willy@...radead.org>,
	akpm@...ux-foundation.org,
	kent.overstreet@...ux.dev,
	corbet@....net,
	ranxiaokai627@....com,
	ran.xiaokai@....com.cn,
	linux-doc@...r.kernel.org,
	linux-kernel@...r.kernel.org,
	linux-mm@...ck.org,
	stable@...r.kernel.org
Subject: Re: [PATCH 1/1] Docs/mm/allocation-profiling: describe sysctrl limitations in debug mode

On Thu, 15 Jan 2026 09:05:25 -0800 Suren Baghdasaryan <surenb@...gle.com> wrote:

> On Wed, Jan 14, 2026 at 9:57 PM Matthew Wilcox <willy@...radead.org> wrote:
> >
> > On Wed, Jan 14, 2026 at 09:45:57PM -0800, Suren Baghdasaryan wrote:
> > > +  warnings produces by allocations made while profiling is disabled and freed
> >
> > "produced"
> 
> Thanks! I'll wait for a day and if there are no other objections, I
> will post a fixed version.

Assuming Matthiew's good finding will be fixed,

Acked-by: SeongJae Park <sj@...nel.org>

Fwiw, the typo is also on the .../sysctl/vm.rst part.  And from the finding, I
was wondering if it is better to put the description only one of two documents
rather than having the duplication, and further if the 'Usage:' part of
allocation-profiling.rst is better to be moved to
'Documentation/admin-guide/mm/'.  But I ended up thinking those are too trivial
and small things.


Thanks,
SJ

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ