lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Fri, 25 May 2007 09:56:54 -0400
From:	Jeff Garzik <jeff@...zik.org>
To:	linux-ide@...r.kernel.org
CC:	Dave Dillow <dave@...dillows.org>,
	Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
	dean gaudet <dean@...tic.org>
Subject: [PATCH, RFT, v3] sata_mv: convert to new EH

Hi, linux-ide (and Dave and dean).

I'm looking for some sata_mv testing feedback.  Version 2 of this patch 
was reported to be triggering BUG_ON/WARN_ON messages in mv_qc_issue() 
and mv_get_crpb_status().

I'm looking for someone to be willing to give three sata_mv cases a 
quick test:
	vanilla 2.6.21.X		(latest 2.6.21)
	vanilla 2.6.22-rc2-gitX		(latest release candidate)
	2.6.22-rc2-gitX + attachment	(sata_mv new-EH test patch)

sata_mv saw several changes go into 2.6.22-rc, and I want to make sure 
the BUG_ON/WARN_ON messages do not trigger in the current -rc.  This 
will help me narrow down the source of the dmesg spam.

To answer one of dean's questions about NCQ, check out 
http://linux-ata.org/faq.html#ncq

Thanks,

	Jeff



View attachment "patch" of type "text/plain" (21899 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ