lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 11 Feb 2008 11:38:35 -0800 (PST)
From:	Linus Torvalds <torvalds@...ux-foundation.org>
To:	"Rafael J. Wysocki" <rjw@...k.pl>
cc:	Alessandro Suardi <alessandro.suardi@...il.com>,
	LKML <linux-kernel@...r.kernel.org>,
	Andrew Morton <akpm@...ux-foundation.org>,
	Ingo Molnar <mingo@...e.hu>,
	Peter Zijlstra <a.p.zijlstra@...llo.nl>
Subject: Re: 2.6.24-git2: Oracle 11g VKTM process enters R state on startup
 and is unkillable [still broken in 2.6.25-rc1]



On Mon, 11 Feb 2008, Rafael J. Wysocki wrote:

> On Monday, 11 of February 2008, Alessandro Suardi wrote:
> > >
> > > 2.6.24-git1 is okay
> > > 2.6.24-git2 is bad

Ok, that's git ID's

	b47711bfbcd4eb77ca61ef0162487b20e023ae55 2.6.24-git1
	9b73e76f3cf63379dcf45fcd4f112f5812418d0a 2.6.24-git2

so if you get a git tree, you can do

	gitk b47711b..9b73e76

to see what happened in there. 

However, the obvious candidates are the scheduler or the ocfs2 merge, and 
the latter is only relevant in case you use ocfs2, of course. 

The rest of it tends to be the DVB and SCSI updates.

But it would be great if you could do a bisect and verify. Just do

	git bisect start
	git bisect good b47711bfbcd4eb77ca61ef0162487b20e023ae55
	git bisect bad 9b73e76f3cf63379dcf45fcd4f112f5812418d0a

and off you go..

		Linus
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ