lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 18 Aug 2010 21:00:57 +0200
From:	Jiri Slaby <jirislaby@...il.com>
To:	Christian Samsel <Christian.Samsel@...h-aachen.de>
CC:	LKML <linux-kernel@...r.kernel.org>, stable@...nel.org
Subject: Re: runaway loop modprobe char-major-5-1 has returned?

On 08/18/2010 11:43 AM, Christian Samsel wrote:
> Hi,
> I wanted to build a minimal kernel as Xen DomU, but stumbled across
> 
> [    0.029457] VFS: Disk quotas dquot_6.5.2
> [    0.029559] Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
> [    0.029973] Installing knfsd (copyright (C) 1996 okir@...ad.swb.de).
> [    0.030662] msgmni has been set to 243
> [    0.099708] request_module: runaway loop modprobe char-major-5-1
> [    0.100482] request_module: runaway loop modprobe char-major-5-1
> [    0.101851] request_module: runaway loop modprobe char-major-5-1
> [    0.102534] request_module: runaway loop modprobe char-major-5-1
> [    0.106311] request_module: runaway loop modprobe char-major-5-1
> (hangs)
> 
> after reading http://lwn.net/Articles/310472/ and comparing the output after 
> msgmni of a working kernel on a other machine i found the config option change 
> which breaks it:

Hi, you may want this:
31d1d48e199e99077fb30f6fb9a793be7bec756f

Adding stable to consider it for inclusion in .35 stable too.

-- 
js
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists