lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <20060805183842.a23a46cb.pj@sgi.com>
Date:	Sat, 5 Aug 2006 18:38:42 -0700
From:	Paul Jackson <pj@....com>
To:	"Siddha, Suresh B" <suresh.b.siddha@...el.com>
Cc:	mingo@...e.hu, nickpiggin@...oo.com.au, vatsa@...ibm.com,
	Simon.Derr@...l.net, steiner@....com, linux-kernel@...r.kernel.org,
	akpm@...l.org
Subject: Re: [BUG] sched: big numa dynamic sched domain memory corruption

Suresh wrote:
> Paul, I will answer your questions on Suse bugzilla as that is a better
> forum than lkml.

Well ... can't say I ever got answers to some of my questions.

But the critical one was answered - what patch(es) do I need
to fix this memory corruption problem on SLES10 kernels.

Earlier, Suresh had recommended [numbers added by pj]:
> Basically SLES10 has to backport all these patches:
> 
> 1) sched: fix group power for allnodes_domains
> 2) sched_domai: Allocate sched_group structures dynamically
> 3) sched: build_sched_domains() fix


Only two of these three patches are needed for this memory corruption
bug:

  1) sched: fix group power for allnodes_domains
  3) sched: build_sched_domains() fix

Patch (2) addresses a separate problem, and has been reworked since
anyway, and was the one that caused me grief backporting SLES10 as it
depended on other patches not in SLES10.

The key fix for the memory corruption is in patch (1).  This patch went
into Linus's tree on March 28, 2006.  Patch (3) fixed a bug introduced
in the first patch.

-- 
                  I won't rest till it's the best ...
                  Programmer, Linux Scalability
                  Paul Jackson <pj@....com> 1.925.600.0401
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ