lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <47B0D0AF.2050200@s5r6.in-berlin.de>
Date:	Mon, 11 Feb 2008 23:48:15 +0100
From:	Stefan Richter <stefanr@...6.in-berlin.de>
To:	Andrew Morton <akpm@...ux-foundation.org>
CC:	Torsten Kaiser <just.for.lkml@...glemail.com>,
	torvalds@...ux-foundation.org, linux-kernel@...r.kernel.org
Subject: Re: Linux 2.6.25-rc1

Andrew Morton wrote:
> On Mon, 11 Feb 2008 22:46:18 +0100
> "Torsten Kaiser" <just.for.lkml@...glemail.com> wrote:
>> The system is a dual opteron x86_64 system with 4 GB ECC RAM and an
>> nVidia 3600 chipset (MCP55).
>> As noted in the rc3-mm2-thread the crash will also happen, if I use
>> normal ethernet instead of ether1394.
> 
> But this is a crash inside the 1394 code.  So if you're getting a crash
> with plain-old-ethernet then it is a different crash.  It'd be good if we
> could see the oops trace for that one too please.

There are no bugs in 1394. :-)

Here are two postings from Torsten which I found in my mail archive.

2007-11-29, an IP-over-1394 backtrace + an ethernet backtrace:
http://marc.info/?l=linux-kernel&m=119636996902805

2007-12-03, a backtrace in the TCP code:
http://marc.info/?l=linux-kernel&m=119671371413299
-- 
Stefan Richter
-=====-==--- --=- -=-==
http://arcgraph.de/sr/
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ