lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Fri, 14 Jul 2006 20:31:38 +0200
From:	Takashi Iwai <tiwai@...e.de>
To:	Martin van Es <martin@...anes.com>
Cc:	Alexey Dobriyan <adobriyan@...il.com>, linux-kernel@...r.kernel.org
Subject: Re: Kernel 2.6.17.1 bug/oops in snd_usb_audio subsystem

At Fri, 14 Jul 2006 13:28:40 +0200,
Martin van Es wrote:
> 
> On Friday 14 July 2006 12:54, Alexey Dobriyan wrote:
> > On Fri, Jul 14, 2006 at 11:54:36AM +0200, Martin van Es wrote:
> > > I already sent this mail to perex@...e.cz a couple of days ago since I
> > > thought that was the closest match in the MAINTAINERS list for this oops.
> > > Since I didn't receive any reply
> >
> > Your kernel is tainted. Please complain to kqemu developers. Don't waste
> > Jaroslav's time.
> 
> Thank you Alexey for pointing out I reported this oops while running a tainted 
> kernel (kqemu was indeed tainting it). I interpreted the reply as a request 
> for reproducing the oops on a untainted version of the Kernel of which I'll 
> post the dmesg output below.
> 
> Hope this helps.
> Is there anything else I can do to contribute?

Try to compile with CONFIG_SND_DEBUG=y.  Also, you can try to build
modules from alsa-driver-1.0.12rc1 whether the bug still exists in the
latest version.

The problem is on OSS emulation, so check other OSS apps whether the
similar problem happens.


Takashi
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ