lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Fri, 18 Jul 2008 01:56:57 +0200
From:	Ingo Molnar <mingo@...e.hu>
To:	Vegard Nossum <vegard.nossum@...il.com>
Cc:	linux-kernel@...r.kernel.org, netdev@...r.kernel.org,
	Pekka Enberg <penberg@...helsinki.fi>,
	"Rafael J. Wysocki" <rjw@...k.pl>
Subject: Re: [bug, netconsole, SLUB] BUG skbuff_head_cache: Poison
	overwritten


* Vegard Nossum <vegard.nossum@...il.com> wrote:

> On Thu, Jul 17, 2008 at 11:42 PM, Ingo Molnar <mingo@...e.hu> wrote:
> > With this config:
> >
> >   http://redhat.com/~mingo/misc/config-Thu_Jul_17_20_24_45_CEST_2008.bad
> >
> 
> It doesn't actually work. The config says
> 
>     # head: 088fcf34
> 
> and I checked out this from the tip tree. But kernel-config still
> complains about unknown config options... What went wrong?

that's ok - i've got some local qa helpers that have config options. 

Things like making SMP bootups more likely in randconfig, adding various 
boot parameters to the bootup via .config methods (so that boot 
parameters can be randomized via make randconfig), etc.

these:

  CONFIG_BOOTPARAM_SUPPORT=y
  CONFIG_BOOTPARAM_NO_HZ_OFF=y
  CONFIG_BOOTPARAM_NMI_WATCHDOG_BIT_0=y
  CONFIG_BOOTPARAM_LAPIC=y
  CONFIG_BOOTPARAM_IDLE_MWAIT=y
  CONFIG_BOOTPARAM_NOPAT=y
  CONFIG_BOOTPARAM_NOTSC=y

are equivalent to adding this to the boot line:

   nohz=off nmi_watchdog=1 lapic idle=mwait nopat notsc

although i dont think they are normally material to netconsole workings.

	Ingo
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ