lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <200907241349.58754.vapier@gentoo.org>
Date:	Fri, 24 Jul 2009 13:49:56 -0400
From:	Mike Frysinger <vapier@...too.org>
To:	ltp-list@...ts.sourceforge.net
Cc:	naresh kamboju <naresh.kernel@...il.com>,
	linux-kernel@...r.kernel.org, maxin john <maxinbjohn@...il.com>,
	brinda_mn@...oo.co.in, Oleg Nesterov <oleg@...hat.com>,
	tim.bird@...sony.com, rohit.170309@...il.com
Subject: Re: [LTP] Char Limit issue on 2.6.29 kernels

On Friday 24 July 2009 11:31:59 naresh kamboju wrote:
> I have come across with char Limit issue on 2.6.29 kernels.
>
>
> SIGFAULT:
>
> #define SIZE            8053759
> char buf1[SIZE] ;
>
> NO SIGFAULT:
>
> #define SIZE            8053758
> char buf1[SIZE] ;
>
> This SIGFAULT not observed on 2.6.23 kernels.

-ENOINFO

post some actual code rather than saying "i declared a large buffer and things 
crashed".  is there a reason you cc-ed LTP ?  is this a crash i a LTP test ?

> What could be the changes that effecting from 2.6.23 to 2.6.29 kernels.
> Please share me the information.

git log v2.6.23..v2.6.29
-mike

Download attachment "signature.asc " of type "application/pgp-signature" (837 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ