lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <1160589556.5973.1.camel@localhost.localdomain>
Date:	Wed, 11 Oct 2006 10:59:16 -0700
From:	john stultz <johnstul@...ibm.com>
To:	caglar@...dus.org.tr
Cc:	Andi Kleen <ak@...e.de>, lkml <linux-kernel@...r.kernel.org>
Subject: Re: [RFC] Avoid PIT SMP lockups

On Wed, 2006-10-11 at 13:49 +0300, S.Çağlar Onur wrote:
> 10 Eki 2006 Sal 21:27 tarihinde, john stultz şunları yazmıştı: 
> > On Tue, 2006-10-10 at 12:11 +0300, S.Çağlar Onur wrote:
> > > 07 Eki 2006 Cts 00:38 tarihinde, john stultz şunları yazmıştı:
> > > > S.Çağlar: Could you give it a whirl to see if it changes your vmware
> > > > issue?
> > >
> > > Nothing changes inside the vmware, same panics occured as like before :(
> >
> > Hmm.. Did you manage to grab the full log?
> 
> Yep, [1] here is whole screen and used config, and as andi suggested i 
> recompiled this kernel [pure vanilla 2.6.18] from scratch.
> 
> [1] http://cekirdek.pardus.org.tr/~caglar/2.6.18/

Huh.. that's an odd trace.  Looks like the alternative code is involved.

Mind booting w/ "noreplacement" to see if that avoids it?


thanks
-john


-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ