lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20090309185117.GJ32589@ldl.fc.hp.com>
Date:	Mon, 9 Mar 2009 12:51:17 -0600
From:	Alex Chiang <achiang@...com>
To:	jbarnes@...tuousgeek.org
Cc:	xyzzy@...akeasy.org, djwong@...ibm.com,
	shimada-yxb@...st.nec.co.jp, rjw@...k.pl,
	linux-pci@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH v3 00/11] PCI core learns hotplug

* Alex Chiang <achiang@...com>:
> 
> There is still one major bug somewhere that shows up only when using
> the PCIe portdriver (that is, any time PCIe support is built into
> the kernel). You get an oops during multiple remove/rescan cycles,
> especially on devices with an internal bridge.

Got it, we had a double-free in the PCIe port driver which was
causing all sorts of problems.

I fixed that and now this patch series is stable enough for
others to actually apply and test. As of now, there are no known
bugs.

Of course, I'm going to keep testing and try to find some more
bugs. :)

As a reminder, if you want to play with this series, you'll also
need these two patches:

> 	http://thread.gmane.org/gmane.linux.kernel.pci/3437
> 	http://lkml.org/lkml/2009/3/7/173

And now this third patch:

	http://thread.gmane.org/gmane.linux.kernel.pci/3524

Finally, patch 07/11 needs to be updated. I'll post a reply to
that mail with the updated patch.

Thanks.

/ac

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ