lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <46AC9A8D.8060003@qumranet.com>
Date:	Sun, 29 Jul 2007 16:47:57 +0300
From:	Avi Kivity <avi@...ranet.com>
To:	Alistair John Strachan <alistair@...zero.co.uk>
CC:	kvm-devel@...ts.sourceforge.net, linux-kernel@...r.kernel.org
Subject: Re: 2.6.23-rc1, KVM-AMD problem

Alistair John Strachan wrote:
> On Sunday 29 July 2007 12:34:28 you wrote:
> [snip]
>   
>>> Doesn't help, I still get the same crashes. I tried 2.6.22 again and it's
>>> rock solid by comparison.
>>>       
>> Do you mean, kvm-33 on top of 2.6.22, or the kvm modules from 2.6.22?
>> Please describe your configuration *exactly*.
>>     
>
> I'm using the kvm-33 *userspace* package (based on Debian's kvm-28 packaging) 
> and 2.6.23-rc1's KVM modules. I patched 2.6.23-rc1 with the patch you 
> provided in your last email. So I'm not using -git HEAD.
>
> Maybe there's been additional necessary fixes to -git requiring me to update 
> to HEAD? That wasn't clear from your last email.
>   

No,  that patch is the only potential fix post -rc1.  There are a few 
other fixes there, but they are intended to avoid guest crashes, not 
host crashes.

What guest are you running?  Maybe I can reproduce it here.

-- 
error compiling committee.c: too many arguments to function

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ