lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 04 Dec 2006 02:49:48 +0000
From:	Sergio Monteiro Basto <sergio@...giomb.no-ip.org>
To:	Andreas Jellinghaus <aj@...geon.inka.de>
Cc:	linux-kernel@...r.kernel.org
Subject: Re: linux 2.6.19 still crashing

Hi,
1st you should put this information on http://bugzilla.kernel.org/
(choose enter a new bug, may choose Category ACPI with component
config-interrupts ) for better organization, instead make your own bug
documentation.

The documentation is very good  you should attach the same information
on bugzilla

your bug kept me the attention because on bad interrupts  you have :

21:     100000   IO-APIC-fasteoi   ohci1394

Exactly oops on 100000 interrupts, I had seen this before .
I have my bug on http://bugzilla.kernel.org/show_bug.cgi?id=6419
which one of the bugs looks like similar to yours. 

So, You are saying with kernel 2.6.16.31 with xen 3.0.2, you don't have
this problem , I like to try it, how or where you build this Xenified
kernel ? 

Thanks, 


On Sat, 2006-12-02 at 17:55 +0100, Andreas Jellinghaus wrote: 
> my msi s270 laptop. but all vanilla kernel I ever tried do
> that, also the debian and ubuntu kernel are instable too.

> But: xen 3.0.2 plus xen'ified linux 2.6.16.31 are rock solid.
> any idea what the issue could be? I'm running 64bit kernel,
> 64bit userland (plus some 32bit apps), and the cpu is a turion
> mt-40 (sempron users seem to not have this problem).
> 

-- 
Sérgio M.B.

Download attachment "smime.p7s" of type "application/x-pkcs7-signature" (2166 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ