lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Thu, 12 Mar 2009 08:56:10 +0800
From:	"Luo, Ximin" <ximin.luo@...el.com>
To:	Nico Schottelius <nico-linux-ipw3945-devel@...ottelius.org>
CC:	"ipw3945-devel@...ts.sourceforge.net" 
	<ipw3945-devel@...ts.sourceforge.net>,
	LKML <linux-kernel@...r.kernel.org>,
	"Chatre, Reinette" <reinette.chatre@...el.com>,
	"Zhu, Yi" <yi.zhu@...el.com>
Subject: RE: [ipw3945-devel] iwlagn: Cannot allocate memory on
	2.6.29-rc4-ikn-00001-gd5b5623

Hello Nico,

Thank you very much. :)
Could you please provide more details as comments of that bug, such as OS, uCode and kernel version? If you can easy reproduce it, please tell us the detailed steps to reproduce it? 
It will help our developer to tracking it. Thanks in advance.

Best Regards,
Ximin

-----Original Message-----
From: Nico Schottelius [mailto:nico-linux-ipw3945-devel@...ottelius.org] 
Sent: 2009年3月11日 18:57
To: Luo, Ximin
Cc: ipw3945-devel@...ts.sourceforge.net; LKML; Chatre, Reinette; Zhu, Yi
Subject: Re: [ipw3945-devel] iwlagn: Cannot allocate memory on 2.6.29-rc4-ikn-00001-gd5b5623

Luo, Ximin [Tue, Mar 10, 2009 at 09:05:02AM +0800]:
> Hello Nico,
> 
> This issue is caused by memory allocation failure when allocating rx memory in isr. (From Yi's point) If you are interested in tracking it, please report a bug at http://www.intellinuxwireless.org/bugzilla/ for further tracking.

http://www.intellinuxwireless.org/bugzilla/show_bug.cgi?id=1933

-- 
Think about Free and Open Source Software (FOSS).
http://nico.schottelius.org/documentations/foss/the-term-foss/

PGP: BFE4 C736 ABE5 406F 8F42  F7CF B8BE F92A 9885 188C

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ