lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <55F93685.8090204@suse.cz>
Date:	Wed, 16 Sep 2015 11:29:41 +0200
From:	Jiri Slaby <jslaby@...e.cz>
To:	Shuah Khan <shuahkh@....samsung.com>, stable@...r.kernel.org,
	mark.d.rustad@...el.com
Cc:	linux@...ck-us.net, shuah.kh@...sung.com,
	linux-kernel@...r.kernel.org
Subject: Re: [PATCH 3.12 00/33] 3.12.48-stable review

On 09/15/2015, 06:12 PM, Shuah Khan wrote:
> On 09/15/2015 08:22 AM, Jiri Slaby wrote:
>> This is the start of the stable review cycle for the 3.12.48 release.
>> There are 33 patches in this series, all will be posted as a response
>> to this one.  If anyone has any issues with these being applied, please
>> let me know.
>>
>> Responses should be made by Thu Sep 17 16:20:25 CEST 2015.
>> Anything received after that time might be too late.
>>
>> The whole patch series can be found in one patch at:
>> 	http://kernel.org/pub/linux/kernel/people/jirislaby/stable-review/patch-3.12.48-rc1.xz
>> and the diffstat can be found below.
>>
>> thanks,
>> js
> 
> Jiri,
> 
> I am seeing problems during PCI scans with this patch. I had
> to boot it in recovery mode once and it is booting fine after
> that, however, this is a concern
> 
> Could these be the reason?
> 
> Mark Rustad (2):
>   PCI: Add dev_flags bit to access VPD through function 0
>   PCI: Add VPD function 0 quirk for Intel Ethernet devices

Hi, maybe. Could you either revert those patches or test commit
a7775d15b11a277f8af from this tree:
git://git.kernel.org/pub/scm/linux/kernel/git/jirislaby/linux-stable.git
to verify?

thanks,
-- 
js
suse labs
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ