lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 20 Oct 2006 10:19:27 -0500 From: Will Schmidt <will_schmidt@...t.ibm.com> To: linux-kernel@...r.kernel.org Subject: Re: kernel BUG in __cache_alloc_node at linux-2.6.git/mm/slab.c:3177! On Fri, 2006-20-10 at 15:18 +0100, Andy Whitcroft wrote: > Paul Mackerras wrote: > > Christoph Lameter writes: > > I got dropped off the CC list somewhere.. :-( if something is bouncing, let me know,.. otherwise please dont do that.. > Mel Gorman and I have been poking at this from different ends. Mel from > the context of this thread and myself trying to fix a machine which was > exhibiting on 32MB of ram in node 0 and the rest in node 1. > > I remember that we used to have code to cope with this in the ppc64 > architecture, indeed I remember reviewing it all that time ago. Looking > at the current state of the tree it was removed in the two patches below > in mainline: > "[PATCH] Remove SPAN_OTHER_NODES config definition" > "[PATCH] mm: remove arch independent NODES_SPAN_OTHER_NODES" > > These commits: > f62859bb6871c5e4a8e591c60befc8caaf54db8c > a94b3ab7eab4edcc9b2cb474b188f774c331adf7 > > I'll follow up to this email with the reversion patch we used in > testing. It seems to sort this problem out at least, though now its > blam'ing in ibmveth, so am retesting with yet another patch. This patch > reverts the two patches above and updates the commentry on the Kconfig > entry. I've got a couple LPARs that exhibit the problem, so can verify your patch once I see it.. -Will > > -apw - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists