lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1323092402.4838.6.camel@mfleming-mobl1.ger.corp.intel.com>
Date:	Mon, 05 Dec 2011 13:40:02 +0000
From:	Matt Fleming <matt@...sole-pimps.org>
To:	Ingo Molnar <mingo@...e.hu>, "Zhang, Rui" <rui.zhang@...el.com>
Cc:	Matthew Garrett <mjg@...hat.com>, linux-kernel@...r.kernel.org,
	x86@...nel.org, Thomas Gleixner <tglx@...utronix.de>,
	"H. Peter Anvin" <hpa@...or.com>,
	Huang Ying <huang.ying.caritas@...il.com>
Subject: Re: [PATCH v4] x86, efi: Calling __pa() with an ioremap'd address
 is invalid

On Mon, 2011-12-05 at 13:32 +0100, Ingo Molnar wrote:
> * Matt Fleming <matt@...sole-pimps.org> wrote:
> 
> > Zhang, it'd be good to make sure that this still actually 
> > fixes your problem on CONFIG_X86_32. Also, if anyone has a 
> > Macbook Pro/Macbook Air, please make sure that this patch 
> > doesn't cause your machine to reboot/hang, as those machines 
> > tend to be the ones that this problem.
> 
> Ping - has it been tested on an affected box, can we apply it to 
> the x86 tree?

I've not had any response from Zhang or anyone with a macbook. So as far
as I know, no, this v4 patch hasn't been tested on any of the affected
machines.

Zhang, could you test this patch, please? Or pass it along to someone
else who can do the testing. Thanks.

-- 
Matt Fleming, Intel Open Source Technology Center

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ