lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <6543.1204139335@turing-police.cc.vt.edu>
Date:	Wed, 27 Feb 2008 14:08:55 -0500
From:	Valdis.Kletnieks@...edu
To:	Andrew Morton <akpm@...ux-foundation.org>
Cc:	Andi Kleen <andi@...stfloor.org>,
	Ilpo Järvinen <ilpo.jarvinen@...sinki.fi>,
	netdev@...r.kernel.org, linux-kernel@...r.kernel.org,
	David Miller <davem@...emloft.net>,
	Arnaldo Carvalho de Melo <acme@...hat.com>
Subject: profile-likely patch (was Re: [RFC PATCH 0/8]: uninline & uninline

On Sat, 23 Feb 2008 10:55:17 PST, Andrew Morton said:

> It does have the downside that the kernel explodes if someone adds unlikely
> or likely to the vdso code and I need to occasionally hunt down new
> additions and revert them in that patch.  That makes it a bit of a
> maintenance burden.

I think it exploded again, for some other reason...

I just gave it a try just for grins-n-giggles.  The resulting kernel got loaded
by grub, the screen cleared, and about 5 seconds later it rebooted. Never got
as far as putting up penguin icons.  Tried again with netconsole, early_printk=vga,
and initcall_debug, and it *still* didn't live long enough to produce anything
resembling output.

2.6.25-rc2-mm1, x86_64 on a Dell Latitude D820 laptop, T7200 Core2 Duo.

Attached is my *working* config (I'm using it as I type this).  Changing to
'CONFIG_PROFILE_LIKELY=y' and rebuilding produces wreckage....

View attachment ".config" of type "text/plain " (54421 bytes)

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ