lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Fri, 13 Apr 2012 12:50:05 -0600
From:	Thomas Fjellstrom <thomas@...llstrom.ca>
To:	adam radford <aradford@...il.com>
Cc:	lkml <linux-kernel@...r.kernel.org>, linux-scsi@...r.kernel.org
Subject: Re: stuck in megaraid_sas.c megasas_adp_reset_gen2

On Thu Apr 12, 2012, Thomas Fjellstrom wrote:
> On Thu Apr 12, 2012, adam radford wrote:
> > On Wed, Apr 11, 2012 at 2:44 PM, Thomas Fjellstrom <thomas@...llstrom.ca>
> 
> wrote:
> > > megasas: [55] waiting for 1 commands to complete
> > > ....
> > > megasas: [175] waiting for 1 commands to complete
> > 
> > You still aren't getting interrupts from the card.  Can you re-try
> > with megaraid_sas module parameter msix_disable ?
> > If that doesn't work, contact LSI support and tell them which
> > motherboard, any PCIe bridges, risers, etc you have.
> 
> No luck darn it. with either card.

I've been talking to LSI support for the past few days. So far they are 
unwilling to support my current use case, or fix their INT19 firmware bug (which 
they have acknowledged).

I just hope there aren't any more serious bugs like this in their firmware. 
It's looking pretty scary. If they let this bug live for years, imagine what 
other bugs might lurk. I may have to avoid LSI completely in the future, even 
on real server systems.

> > -Adam


-- 
Thomas Fjellstrom
thomas@...llstrom.ca
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ