lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20070425125406.9253bd49.akpm@linux-foundation.org>
Date:	Wed, 25 Apr 2007 12:54:06 -0700
From:	Andrew Morton <akpm@...ux-foundation.org>
To:	Dave Jones <davej@...hat.com>
Cc:	"Antonino A. Daplas" <adaplas@...il.com>,
	Linux Kernel Development <linux-kernel@...r.kernel.org>,
	Pavel Emelianov <xemul@...ru>
Subject: Re: 2.6.21-rc7-mm1: Oops and Gnome desktop freezes

On Wed, 25 Apr 2007 15:35:11 -0400 Dave Jones <davej@...hat.com> wrote:

> On Wed, Apr 25, 2007 at 12:12:42PM -0700, Andrew Morton wrote:
>   > > EIP:    0060:[<c014c469>]    Tainted: G      D VLI
>  > 
>  > For some reason all oopses (and boy there are a lot of them) are being
>  > described as tainted.
> 
> What's "D" though ?

Pretty flattering, if it's on a scale of A-F.

>  grep -i taint broken-out/* doesn't show
> -mm adding any new flags, and I don't see it present in mainline.

report-that-kernel-is-tainted-if-there-were-an-oops-before.patch:

+  8: 'D' if a kernel has died recently, i.e. there was an OOPS or BUG
+      before, ' ' otherwise. This is useful when seeing the calltrace
+      from SysRq-P output.

I suspect that patch has gone bad and it's reporting 'D' for the very first
oops, which it shouldn't do.

But I haven't checked that theory.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ