Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932413AbYBVMS1 (ORCPT ); Fri, 22 Feb 2008 07:18:27 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1752425AbYBVMSR (ORCPT ); Fri, 22 Feb 2008 07:18:17 -0500 Received: from mx3.mail.elte.hu ([157.181.1.138]:57793 "EHLO mx3.mail.elte.hu" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751846AbYBVMSQ (ORCPT ); Fri, 22 Feb 2008 07:18:16 -0500 Date: Fri, 22 Feb 2008 13:17:51 +0100 From: Ingo Molnar To: James Morris Cc: Sam Ravnborg , Linus Torvalds , linux-kernel@vger.kernel.org, Arjan van de Ven , Thomas Gleixner , Ingo Molnar , "H. Peter Anvin" Subject: Re: Regression [Was: Boot hang with stack protector on x86_64] Message-ID: <20080222121751.GA17889@elte.hu> References: <20080222075950.GB2660@uranus.ravnborg.org> <20080222093621.GG327@elte.hu> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.17 (2007-11-01) X-ELTE-VirusStatus: clean X-ELTE-SpamScore: -1.5 X-ELTE-SpamLevel: X-ELTE-SpamCheck: no X-ELTE-SpamVersion: ELTE 2.0 X-ELTE-SpamCheck-Details: score=-1.5 required=5.9 tests=BAYES_00 autolearn=no SpamAssassin version=3.2.3 -1.5 BAYES_00 BODY: Bayesian spam probability is 0 to 1% [score: 0.0000] Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1126 Lines: 32 * James Morris wrote: > > works fine for you? That has all the current stackprotector fixes. I > > plan to send a separate pull request with just the stackprotector > > fixes to Linus, they are looking good in testing so far. > > Nope, same problem. > > (I followed your instructions in the readme exactly). stupid double check, does "git-log | grep stackpro" give you the fixes: This patch adds a simple self-test capability to the stackprotector x86: unify stackprotector features streamline the stackprotector features under a single option x86: stackprotector: mix TSC to the boot canary x86: fix the stackprotector canary of the boot CPU stackprotector: add boot_init_stack_canary() stackprotector: include files ? Please send me your full .config and the gcc version you used for building the failing kernel. Ingo -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/