lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 17 Nov 2008 12:05:00 +0900
From:	Tejun Heo <htejun@...il.com>
To:	Frans Pop <elendil@...net.nl>
CC:	Gerold Jury <gml@...de.at>, efault@....de,
	linux-ide@...r.kernel.org, linux-kernel@...r.kernel.org,
	linux-scsi@...r.kernel.org, vsu@...linux.ru
Subject: Re: extra bytes written to SATA DVD drive on kernel 2.6.23 till 2.6.24.2

Frans Pop wrote:
> Gerold Jury wrote:
>> 0001ffe0  e0 ff e1 ff e2 ff e3 ff  e4 ff e5 ff e6 ff e7 ff  |................|
>> 0001fff0  e8 ff e9 ff ea ff eb ff  ec ff ed ff ee ff ef ff  |................|
>> 00020000  2a 00 00 00 00 40 00 00  40 00 00 00 00 40 00 00  |*....@..@....@..|
> 
> Looks broken here too.
> 
>> 00020010  08 ff 09 ff 0a ff 0b ff  08 ff 09 ff 0a ff 0b ff  |................|
>> 00020020  00 00 01 00 02 00 03 00  04 00 05 00 06 00 07 00  |................|
> 
> It also seems like part gets repeated after the break in both cases.

Can you guys please add yourselves to bz#10743?

  http://bugzilla.kernel.org/show_bug.cgi?id=10743

Please test 2.6.28-rc5 as it contains sata_via changes (TF access needed
specific workaround) and see whether the problem is fixed and report on bz.

Thanks a lot.  Let's get this thing solved.

-- 
tejun
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ