lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Tue, 01 Mar 2016 06:25:45 +0000
From:	Greg KH <gregkh@...uxfoundation.org>
To:	Patrick Schaaf <netdev@....de>
Cc:	<netdev@...r.kernel.org>, Yuval Mintz <Yuval.Mintz@...gic.com>
Subject: Re: [PATCH] [BACKPORT] [3.14.56] bnx2x: Don't notify about scratchpad parities

On Thu, Dec 10, 2015 at 02:37:34PM +0100, Patrick Schaaf wrote:
> On Friday 06 November 2015 09:32:46 Greg KH wrote:
> > On Thu, Nov 05, 2015 at 11:18:37AM +0100, Patrick Schaaf wrote:
> > > bnx2x: Don't notify about scratchpad parities
> > > 
> > > This is a (trivial) "backport" of ad6afbe9578d1fa26680faf78c846bd8c00d1d6e
> > > to stable kernel 3.14.56.
> > 
> > This patch isn't in 4.1 either, do you want it there as well?
> 
> Hi Greg,
> 
> I didn't see the patch in 3.14.57 or 3.14.58 - could you please consider it 
> again (for all stable kernels that don't have it)?
> 
> My three machines with bnx2x interfaces have been running file with patch 
> 3.14.56, for the last 35 days. The original problematic event (spewing a 
> million messages which are suppressed by that patch), did not reoccur so far 
> (neither did any other issue, dmesg is completely empty since boot).
> 
> best regards
>   Patrick
> 
> Related earlier posts / reports, for reference:
> 
> http://marc.info/?l=linux-netdev&m=144663711626469
> http://lists.openwall.net/netdev/2015/11/05/48

Sorry for the long delay, now queued up.

greg k-h

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ