lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <200707291444.18024.alistair@devzero.co.uk>
Date:	Sun, 29 Jul 2007 14:44:17 +0100
From:	Alistair John Strachan <alistair@...zero.co.uk>
To:	Avi Kivity <avi@...ranet.com>
Cc:	kvm-devel@...ts.sourceforge.net, linux-kernel@...r.kernel.org
Subject: Re: 2.6.23-rc1, KVM-AMD problem

On Sunday 29 July 2007 12:34:28 you wrote:
[snip]
> > Doesn't help, I still get the same crashes. I tried 2.6.22 again and it's
> > rock solid by comparison.
>
> Do you mean, kvm-33 on top of 2.6.22, or the kvm modules from 2.6.22?
> Please describe your configuration *exactly*.

I'm using the kvm-33 *userspace* package (based on Debian's kvm-28 packaging) 
and 2.6.23-rc1's KVM modules. I patched 2.6.23-rc1 with the patch you 
provided in your last email. So I'm not using -git HEAD.

Maybe there's been additional necessary fixes to -git requiring me to update 
to HEAD? That wasn't clear from your last email.

> And what do you mean, "rock solid by comparison"?  Either it's rock
> solid or it isn't.

It's rock solid. It does not crash.

-- 
Cheers,
Alistair.

137/1 Warrender Park Road, Edinburgh, UK.

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ