lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Tue, 9 Dec 2008 16:50:25 +0100
From:	Bruno Prémont <bruno.premont@...tena.lu>
To:	Greg KH <gregkh@...e.de>
Cc:	Linux Kernel <linux-kernel@...r.kernel.org>,
	Ingo Molnar <mingo@...e.hu>, "Rafael J. Wysocki" <rjw@...k.pl>,
	Stefan Winter <stefan.winter@...tena.lu>
Subject: Re: [2.6.27.4-5 stable regressions] Kernel boot early crash with
 low-64k reservation patches

On Tue, 9 Dec 2008 07:36:54 -0800 Greg KH wrote:
> On Tue, Dec 09, 2008 at 08:34:40AM +0100, Bruno Prémont wrote:
> > Hi,
> > 
> > On a VMWare (ESX 3.5.0 Update 3) guest we get boot failure at the
> > very beginning of boot process. (Boot successful with 2.6.27.4,
> > failing with 2.6.27.x where x > 4 or just adding the 5 patches
> > below to 2.6.27.4)
> > 
> > State of config option
> >   CONFIG_X86_RESERVE_LOW_64K=y
> > or
> >   # CONFIG_X86_RESERVE_LOW_64K not set
> > does not make any difference.
> 
> Does the 2.6.27.8 kernel work better for you, or does it also fail?
> 
> Also, have you tried the 2.6.28-rc releases to see if the problem is
> also there?
> 
> thanks,
> 
> greg k-h

Any stable release after 2.6.27.4 is bad (that is 2.6.27.5,
2.6.27.6, 2.6.27.8 -- 2.6.27.7 has not been tested), they all produce
the same (not verified exact register/stack values) result.

We have not tried any 2.6.28-rc kernels yet.

Bruno
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists