lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 19 Dec 2008 16:46:06 -0800 From: Greg KH <gregkh@...e.de> To: Pekka Enberg <penberg@...helsinki.fi> Cc: Vegard Nossum <vegard.nossum@...il.com>, Linux Kernel Mailing List <linux-kernel@...r.kernel.org> Subject: Re: v2.6.28-rc7: error in panic code? (NULL pointer dereference at 0000004c) On Fri, Dec 19, 2008 at 10:35:57PM +0200, Pekka Enberg wrote: > Hi Greg, > > On Fri, Dec 19, 2008 at 06:19:43PM +0100, Vegard Nossum wrote: > > Fixes what? It might be quite difficult to revert that patch now, as > > the infrastructure is no longer in place to use a private pci device > > list, that code is long gone. > > Vegard forced one oops but got two! The first one is expected and but > the second one shouldn't probably be there: "Second" oopses are known to not be reliable, I wouldn't count it as a real problem unless it happens on its own. > >> > [ 0.040993] EIP: [<c13b41dc>] klist_next+0x10/0x8d SS:ESP 0068:c165dd48 > > Looks like the patch Vegard identified breaks something in the oops path? Very wierd, I also don't understand how reverting the specific patch would even make a buildable system. thanks, greg k-h -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists