lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Fri, 11 Jan 2008 11:33:25 -0600
From:	James Bottomley <James.Bottomley@...senPartnership.com>
To:	Alan Cox <alan@...rguk.ukuu.org.uk>
Cc:	Filippos Papadopoulos <psybases@...il.com>,
	linux-scsi@...r.kernel.org, Chuck Ebbert <cebbert@...hat.com>,
	Boaz Harrosh <bharrosh@...asas.com>,
	Andrew Morton <akpm@...ux-foundation.org>,
	linux-kernel@...r.kernel.org
Subject: Re: INITIO scsi driver fails to work properly


On Fri, 2008-01-11 at 17:01 +0000, Alan Cox wrote:
> > Yes it works under 2.6.16.13.  See the beginning of this thread, i
> > mention there some things about newer versions.
> 
> It worked (ish.. it has problems and always has had) before the big
> updates, and according to my tester after the big update + two patches
> that escaped somewhere in the process. Unfortunately my tester no longer
> has the card to dig further.
> 
> The 0x0 bug was fixed a while ago but seems to have sat in -mm for a bit.
> Don't know about further stuff.

The statement that OpenSuse 10.3, based on 2.6.22.5, also fails
indicates there may be something else that predates your reorganisation
at the root of this (depending on whether the vendor kernel contains a
back port or not).  That's why I want to see what happens on this system
with a vanilla 2.6.22

James


--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ