Re: [PATCH] x86: _edata should include all .data.* sections on X86_64

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Catalin Marinas schrieb:
On Tue, 2009-07-14 at 12:13 +0200, Alexey Fisher wrote:
With this patch i have only 25 reports....
but i still have a lot of ext4 and some other reports.

Apart from ext4, what are the other reports?

Thanks.


this is complete trace from debug/kmemleak .
i will compile now latest linux-arm.org/linux-2.6.git

but i think i need step by step howto... it's really new for me.

unreferenced object 0xffff88013711c2a8 (size 64):
  comm "swapper", pid 1, jiffies 4294892383
  backtrace:
    [<ffffffff810fbaca>] create_object+0x13a/0x2c0
    [<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
    [<ffffffff810f596b>] __kmalloc+0x11b/0x210
    [<ffffffff81263b41>] kzalloc+0xf/0x11
    [<ffffffff8126416d>] acpi_add_single_object+0x5b0/0xd5a
    [<ffffffff81264b32>] acpi_bus_scan+0x125/0x1af
    [<ffffffff8176dcb7>] acpi_scan_init+0xc8/0xe9
    [<ffffffff8176da72>] acpi_init+0x21f/0x265
    [<ffffffff8100905b>] do_one_initcall+0x4b/0x190
    [<ffffffff8174b6ef>] kernel_init+0x169/0x1bf
    [<ffffffff8100c69a>] child_rip+0xa/0x20
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8801349aa150 (size 96):
  comm "swapper", pid 1, jiffies 4294892492
  backtrace:
    [<ffffffff810fbaca>] create_object+0x13a/0x2c0
    [<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
    [<ffffffff810f4b8b>] kmem_cache_alloc+0xfb/0x180
    [<ffffffff811f815f>] new_inode_smack+0x2f/0xc0
    [<ffffffff811f8215>] smack_inode_alloc_security+0x25/0x40
    [<ffffffff811f0cdc>] security_inode_alloc+0x1c/0x20
    [<ffffffff811135a5>] inode_init_always+0xc5/0x220
    [<ffffffff8111372c>] alloc_inode+0x2c/0x50
    [<ffffffff81113778>] new_inode+0x28/0xc0
    [<ffffffff8111d581>] simple_fill_super+0x41/0x200
    [<ffffffff811f8da5>] smk_fill_super+0x25/0x70
    [<ffffffff81100ed8>] get_sb_single+0x98/0xc0
    [<ffffffff811f8d73>] smk_get_sb+0x13/0x20
    [<ffffffff81100bf6>] vfs_kern_mount+0x76/0x180
    [<ffffffff81100d14>] kern_mount_data+0x14/0x20
    [<ffffffff817677d0>] init_smk_fs+0x3b/0x7b
unreferenced object 0xffff880133bf8540 (size 96):
  comm "swapper", pid 1, jiffies 4294893530
  backtrace:
    [<ffffffff810fbaca>] create_object+0x13a/0x2c0
    [<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
    [<ffffffff810f596b>] __kmalloc+0x11b/0x210
    [<ffffffff8128b80c>] acpi_processor_register_performance+0x2ab/0x3eb
    [<ffffffff8101fc51>] acpi_cpufreq_cpu_init+0xb1/0x500
    [<ffffffff813b4004>] cpufreq_add_dev+0x154/0x650
    [<ffffffff81300926>] sysdev_driver_register+0xa6/0x130
    [<ffffffff813b3000>] cpufreq_register_driver+0x80/0x160
    [<ffffffff81754348>] acpi_cpufreq_init+0x91/0xc7
    [<ffffffff8100905b>] do_one_initcall+0x4b/0x190
    [<ffffffff8174b6ef>] kernel_init+0x169/0x1bf
    [<ffffffff8100c69a>] child_rip+0xa/0x20
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff880133bf85e8 (size 96):
  comm "swapper", pid 1, jiffies 4294893531
  backtrace:
    [<ffffffff810fbaca>] create_object+0x13a/0x2c0
    [<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
    [<ffffffff810f596b>] __kmalloc+0x11b/0x210
    [<ffffffff8128b80c>] acpi_processor_register_performance+0x2ab/0x3eb
    [<ffffffff8101fc51>] acpi_cpufreq_cpu_init+0xb1/0x500
    [<ffffffff813b4004>] cpufreq_add_dev+0x154/0x650
    [<ffffffff81300926>] sysdev_driver_register+0xa6/0x130
    [<ffffffff813b3000>] cpufreq_register_driver+0x80/0x160
    [<ffffffff81754348>] acpi_cpufreq_init+0x91/0xc7
    [<ffffffff8100905b>] do_one_initcall+0x4b/0x190
    [<ffffffff8174b6ef>] kernel_init+0x169/0x1bf
    [<ffffffff8100c69a>] child_rip+0xa/0x20
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff880132c48890 (size 1024):
  comm "exe", pid 1612, jiffies 4294894130
  backtrace:
    [<ffffffff810fbaca>] create_object+0x13a/0x2c0
    [<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
    [<ffffffff810f596b>] __kmalloc+0x11b/0x210
    [<ffffffff811ae061>] ext4_mb_init+0x1b1/0x5c0
    [<ffffffff8119f1e9>] ext4_fill_super+0x1e29/0x2720
    [<ffffffff8110111f>] get_sb_bdev+0x16f/0x1b0
    [<ffffffff81195413>] ext4_get_sb+0x13/0x20
    [<ffffffff81100bf6>] vfs_kern_mount+0x76/0x180
    [<ffffffff81100d6d>] do_kern_mount+0x4d/0x120
    [<ffffffff81118ee7>] do_mount+0x307/0x8b0
    [<ffffffff8111951f>] sys_mount+0x8f/0xe0
    [<ffffffff8100b66b>] system_call_fastpath+0x16/0x1b
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8801335be738 (size 192):
  comm "exe", pid 1612, jiffies 4294894130
  backtrace:
    [<ffffffff810fbaca>] create_object+0x13a/0x2c0
    [<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
    [<ffffffff810f596b>] __kmalloc+0x11b/0x210
    [<ffffffff811ae061>] ext4_mb_init+0x1b1/0x5c0
    [<ffffffff8119f1e9>] ext4_fill_super+0x1e29/0x2720
    [<ffffffff8110111f>] get_sb_bdev+0x16f/0x1b0
    [<ffffffff81195413>] ext4_get_sb+0x13/0x20
    [<ffffffff81100bf6>] vfs_kern_mount+0x76/0x180
    [<ffffffff81100d6d>] do_kern_mount+0x4d/0x120
    [<ffffffff81118ee7>] do_mount+0x307/0x8b0
    [<ffffffff8111951f>] sys_mount+0x8f/0xe0
    [<ffffffff8100b66b>] system_call_fastpath+0x16/0x1b
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8801329ac708 (size 128):
  comm "udevd", pid 1710, jiffies 4294894924
  backtrace:
    [<ffffffff810fbaca>] create_object+0x13a/0x2c0
    [<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
    [<ffffffff810f4b8b>] kmem_cache_alloc+0xfb/0x180
    [<ffffffff811325fa>] sys_inotify_add_watch+0xca/0x350
    [<ffffffff8100b66b>] system_call_fastpath+0x16/0x1b
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8801329ac7d0 (size 128):
  comm "udevd", pid 1710, jiffies 4294894924
  backtrace:
    [<ffffffff810fbaca>] create_object+0x13a/0x2c0
    [<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
    [<ffffffff810f4b8b>] kmem_cache_alloc+0xfb/0x180
    [<ffffffff811325fa>] sys_inotify_add_watch+0xca/0x350
    [<ffffffff8100b66b>] system_call_fastpath+0x16/0x1b
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8801329ac898 (size 128):
  comm "udevd", pid 1710, jiffies 4294894924
  backtrace:
    [<ffffffff810fbaca>] create_object+0x13a/0x2c0
    [<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
    [<ffffffff810f4b8b>] kmem_cache_alloc+0xfb/0x180
    [<ffffffff811325fa>] sys_inotify_add_watch+0xca/0x350
    [<ffffffff8100b66b>] system_call_fastpath+0x16/0x1b
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8801329ac960 (size 128):
  comm "udevd", pid 1710, jiffies 4294894924
  backtrace:
    [<ffffffff810fbaca>] create_object+0x13a/0x2c0
    [<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
    [<ffffffff810f4b8b>] kmem_cache_alloc+0xfb/0x180
    [<ffffffff811325fa>] sys_inotify_add_watch+0xca/0x350
    [<ffffffff8100b66b>] system_call_fastpath+0x16/0x1b
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8801329aca28 (size 128):
  comm "udevd", pid 1710, jiffies 4294894925
  backtrace:
    [<ffffffff810fbaca>] create_object+0x13a/0x2c0
    [<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
    [<ffffffff810f4b8b>] kmem_cache_alloc+0xfb/0x180
    [<ffffffff811325fa>] sys_inotify_add_watch+0xca/0x350
    [<ffffffff8100b66b>] system_call_fastpath+0x16/0x1b
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8801329acaf0 (size 128):
  comm "udevd", pid 1710, jiffies 4294894925
  backtrace:
    [<ffffffff810fbaca>] create_object+0x13a/0x2c0
    [<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
    [<ffffffff810f4b8b>] kmem_cache_alloc+0xfb/0x180
    [<ffffffff811325fa>] sys_inotify_add_watch+0xca/0x350
    [<ffffffff8100b66b>] system_call_fastpath+0x16/0x1b
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8801329acbb8 (size 128):
  comm "udevd", pid 1710, jiffies 4294894925
  backtrace:
    [<ffffffff810fbaca>] create_object+0x13a/0x2c0
    [<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
    [<ffffffff810f4b8b>] kmem_cache_alloc+0xfb/0x180
    [<ffffffff811325fa>] sys_inotify_add_watch+0xca/0x350
    [<ffffffff8100b66b>] system_call_fastpath+0x16/0x1b
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8801329ace10 (size 128):
  comm "udevd", pid 1710, jiffies 4294894925
  backtrace:
    [<ffffffff810fbaca>] create_object+0x13a/0x2c0
    [<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
    [<ffffffff810f4b8b>] kmem_cache_alloc+0xfb/0x180
    [<ffffffff811325fa>] sys_inotify_add_watch+0xca/0x350
    [<ffffffff8100b66b>] system_call_fastpath+0x16/0x1b
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88012f48d440 (size 64):
  comm "mount", pid 2393, jiffies 4294896562
  backtrace:
    [<ffffffff810fbaca>] create_object+0x13a/0x2c0
    [<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
    [<ffffffff810f596b>] __kmalloc+0x11b/0x210
    [<ffffffff811ae061>] ext4_mb_init+0x1b1/0x5c0
    [<ffffffff8119f1e9>] ext4_fill_super+0x1e29/0x2720
    [<ffffffff8110111f>] get_sb_bdev+0x16f/0x1b0
    [<ffffffff81195413>] ext4_get_sb+0x13/0x20
    [<ffffffff81100bf6>] vfs_kern_mount+0x76/0x180
    [<ffffffff81100d6d>] do_kern_mount+0x4d/0x120
    [<ffffffff81118ee7>] do_mount+0x307/0x8b0
    [<ffffffff8111951f>] sys_mount+0x8f/0xe0
    [<ffffffff8100b66b>] system_call_fastpath+0x16/0x1b
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff880132815158 (size 1024):
  comm "mount", pid 2393, jiffies 4294896569
  backtrace:
    [<ffffffff810fbaca>] create_object+0x13a/0x2c0
    [<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
    [<ffffffff810f596b>] __kmalloc+0x11b/0x210
    [<ffffffff811ae061>] ext4_mb_init+0x1b1/0x5c0
    [<ffffffff8119f1e9>] ext4_fill_super+0x1e29/0x2720
    [<ffffffff8110111f>] get_sb_bdev+0x16f/0x1b0
    [<ffffffff81195413>] ext4_get_sb+0x13/0x20
    [<ffffffff81100bf6>] vfs_kern_mount+0x76/0x180
    [<ffffffff81100d6d>] do_kern_mount+0x4d/0x120
    [<ffffffff81118ee7>] do_mount+0x307/0x8b0
    [<ffffffff8111951f>] sys_mount+0x8f/0xe0
    [<ffffffff8100b66b>] system_call_fastpath+0x16/0x1b
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8801328159e8 (size 1024):
  comm "mount", pid 2393, jiffies 4294896569
  backtrace:
    [<ffffffff810fbaca>] create_object+0x13a/0x2c0
    [<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
    [<ffffffff810f596b>] __kmalloc+0x11b/0x210
    [<ffffffff811ae061>] ext4_mb_init+0x1b1/0x5c0
    [<ffffffff8119f1e9>] ext4_fill_super+0x1e29/0x2720
    [<ffffffff8110111f>] get_sb_bdev+0x16f/0x1b0
    [<ffffffff81195413>] ext4_get_sb+0x13/0x20
    [<ffffffff81100bf6>] vfs_kern_mount+0x76/0x180
    [<ffffffff81100d6d>] do_kern_mount+0x4d/0x120
    [<ffffffff81118ee7>] do_mount+0x307/0x8b0
    [<ffffffff8111951f>] sys_mount+0x8f/0xe0
    [<ffffffff8100b66b>] system_call_fastpath+0x16/0x1b
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff880132816b08 (size 1024):
  comm "mount", pid 2393, jiffies 4294896569
  backtrace:
    [<ffffffff810fbaca>] create_object+0x13a/0x2c0
    [<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
    [<ffffffff810f596b>] __kmalloc+0x11b/0x210
    [<ffffffff811ae061>] ext4_mb_init+0x1b1/0x5c0
    [<ffffffff8119f1e9>] ext4_fill_super+0x1e29/0x2720
    [<ffffffff8110111f>] get_sb_bdev+0x16f/0x1b0
    [<ffffffff81195413>] ext4_get_sb+0x13/0x20
    [<ffffffff81100bf6>] vfs_kern_mount+0x76/0x180
    [<ffffffff81100d6d>] do_kern_mount+0x4d/0x120
    [<ffffffff81118ee7>] do_mount+0x307/0x8b0
    [<ffffffff8111951f>] sys_mount+0x8f/0xe0
    [<ffffffff8100b66b>] system_call_fastpath+0x16/0x1b
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8801328155a0 (size 1024):
  comm "mount", pid 2393, jiffies 4294896569
  backtrace:
    [<ffffffff810fbaca>] create_object+0x13a/0x2c0
    [<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
    [<ffffffff810f596b>] __kmalloc+0x11b/0x210
    [<ffffffff811ae061>] ext4_mb_init+0x1b1/0x5c0
    [<ffffffff8119f1e9>] ext4_fill_super+0x1e29/0x2720
    [<ffffffff8110111f>] get_sb_bdev+0x16f/0x1b0
    [<ffffffff81195413>] ext4_get_sb+0x13/0x20
    [<ffffffff81100bf6>] vfs_kern_mount+0x76/0x180
    [<ffffffff81100d6d>] do_kern_mount+0x4d/0x120
    [<ffffffff81118ee7>] do_mount+0x307/0x8b0
    [<ffffffff8111951f>] sys_mount+0x8f/0xe0
    [<ffffffff8100b66b>] system_call_fastpath+0x16/0x1b
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff880132812f18 (size 1024):
  comm "mount", pid 2393, jiffies 4294896583
  backtrace:
    [<ffffffff810fbaca>] create_object+0x13a/0x2c0
    [<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
    [<ffffffff810f596b>] __kmalloc+0x11b/0x210
    [<ffffffff811ae061>] ext4_mb_init+0x1b1/0x5c0
    [<ffffffff8119f1e9>] ext4_fill_super+0x1e29/0x2720
    [<ffffffff8110111f>] get_sb_bdev+0x16f/0x1b0
    [<ffffffff81195413>] ext4_get_sb+0x13/0x20
    [<ffffffff81100bf6>] vfs_kern_mount+0x76/0x180
    [<ffffffff81100d6d>] do_kern_mount+0x4d/0x120
    [<ffffffff81118ee7>] do_mount+0x307/0x8b0
    [<ffffffff8111951f>] sys_mount+0x8f/0xe0
    [<ffffffff8100b66b>] system_call_fastpath+0x16/0x1b
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff880132811568 (size 1024):
  comm "mount", pid 2393, jiffies 4294896583
  backtrace:
    [<ffffffff810fbaca>] create_object+0x13a/0x2c0
    [<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
    [<ffffffff810f596b>] __kmalloc+0x11b/0x210
    [<ffffffff811ae061>] ext4_mb_init+0x1b1/0x5c0
    [<ffffffff8119f1e9>] ext4_fill_super+0x1e29/0x2720
    [<ffffffff8110111f>] get_sb_bdev+0x16f/0x1b0
    [<ffffffff81195413>] ext4_get_sb+0x13/0x20
    [<ffffffff81100bf6>] vfs_kern_mount+0x76/0x180
    [<ffffffff81100d6d>] do_kern_mount+0x4d/0x120
    [<ffffffff81118ee7>] do_mount+0x307/0x8b0
    [<ffffffff8111951f>] sys_mount+0x8f/0xe0
    [<ffffffff8100b66b>] system_call_fastpath+0x16/0x1b
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff880132811120 (size 1024):
  comm "mount", pid 2393, jiffies 4294896583
  backtrace:
    [<ffffffff810fbaca>] create_object+0x13a/0x2c0
    [<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
    [<ffffffff810f596b>] __kmalloc+0x11b/0x210
    [<ffffffff811ae061>] ext4_mb_init+0x1b1/0x5c0
    [<ffffffff8119f1e9>] ext4_fill_super+0x1e29/0x2720
    [<ffffffff8110111f>] get_sb_bdev+0x16f/0x1b0
    [<ffffffff81195413>] ext4_get_sb+0x13/0x20
    [<ffffffff81100bf6>] vfs_kern_mount+0x76/0x180
    [<ffffffff81100d6d>] do_kern_mount+0x4d/0x120
    [<ffffffff81118ee7>] do_mount+0x307/0x8b0
    [<ffffffff8111951f>] sys_mount+0x8f/0xe0
    [<ffffffff8100b66b>] system_call_fastpath+0x16/0x1b
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff880132810cd8 (size 1024):
  comm "mount", pid 2393, jiffies 4294896583
  backtrace:
    [<ffffffff810fbaca>] create_object+0x13a/0x2c0
    [<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
    [<ffffffff810f596b>] __kmalloc+0x11b/0x210
    [<ffffffff811ae061>] ext4_mb_init+0x1b1/0x5c0
    [<ffffffff8119f1e9>] ext4_fill_super+0x1e29/0x2720
    [<ffffffff8110111f>] get_sb_bdev+0x16f/0x1b0
    [<ffffffff81195413>] ext4_get_sb+0x13/0x20
    [<ffffffff81100bf6>] vfs_kern_mount+0x76/0x180
    [<ffffffff81100d6d>] do_kern_mount+0x4d/0x120
    [<ffffffff81118ee7>] do_mount+0x307/0x8b0
    [<ffffffff8111951f>] sys_mount+0x8f/0xe0
    [<ffffffff8100b66b>] system_call_fastpath+0x16/0x1b
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff880132810890 (size 1024):
  comm "mount", pid 2393, jiffies 4294896583
  backtrace:
    [<ffffffff810fbaca>] create_object+0x13a/0x2c0
    [<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
    [<ffffffff810f596b>] __kmalloc+0x11b/0x210
    [<ffffffff811ae061>] ext4_mb_init+0x1b1/0x5c0
    [<ffffffff8119f1e9>] ext4_fill_super+0x1e29/0x2720
    [<ffffffff8110111f>] get_sb_bdev+0x16f/0x1b0
    [<ffffffff81195413>] ext4_get_sb+0x13/0x20
    [<ffffffff81100bf6>] vfs_kern_mount+0x76/0x180
    [<ffffffff81100d6d>] do_kern_mount+0x4d/0x120
    [<ffffffff81118ee7>] do_mount+0x307/0x8b0
    [<ffffffff8111951f>] sys_mount+0x8f/0xe0
    [<ffffffff8100b66b>] system_call_fastpath+0x16/0x1b
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff880132810448 (size 1024):
  comm "mount", pid 2393, jiffies 4294896583
  backtrace:
    [<ffffffff810fbaca>] create_object+0x13a/0x2c0
    [<ffffffff810fbd75>] kmemleak_alloc+0x25/0x60
    [<ffffffff810f596b>] __kmalloc+0x11b/0x210
    [<ffffffff811ae061>] ext4_mb_init+0x1b1/0x5c0
    [<ffffffff8119f1e9>] ext4_fill_super+0x1e29/0x2720
    [<ffffffff8110111f>] get_sb_bdev+0x16f/0x1b0
    [<ffffffff81195413>] ext4_get_sb+0x13/0x20
    [<ffffffff81100bf6>] vfs_kern_mount+0x76/0x180
    [<ffffffff81100d6d>] do_kern_mount+0x4d/0x120
    [<ffffffff81118ee7>] do_mount+0x307/0x8b0
    [<ffffffff8111951f>] sys_mount+0x8f/0xe0
    [<ffffffff8100b66b>] system_call_fastpath+0x16/0x1b
    [<ffffffffffffffff>] 0xffffffffffffffff
--
To unsubscribe from this list: send the line "unsubscribe kernel-testers" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux