lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <E6AF1AFDEA62A94A97508F458CBDD47F6F5A34C4@SHSMSX101.ccr.corp.intel.com>
Date:   Sat, 10 Jun 2017 04:16:59 +0000
From:   "Zhuo, Qiuxu" <qiuxu.zhuo@...el.com>
To:     Borislav Petkov <bp@...en8.de>
CC:     "Ye, Xiaolong" <xiaolong.ye@...el.com>,
        'Borislav Petkov' <bp@...e.de>,
        'linux-edac' <linux-edac@...r.kernel.org>,
        'LKML' <linux-kernel@...r.kernel.org>,
        'Stephen Rothwell' <sfr@...b.auug.org.au>,
        "'lkp@...org'" <lkp@...org>
Subject: RE: [lkp-robot] [EDAC, sb_edac]  e2f747b1f4:
 kmsg.EDAC_sbridge:Failed_to_register_device_with_error

> From: Borislav Petkov [mailto:bp@...en8.de] 
>
> Xiaolong,
>
> can you please run Qiuxu's patch to verify it fixes your issue?


Hi Boris,
    I manually verified the fix patch on the Broadwell-DE server on which the bug was found by Xiaolong: 
    the sb_edac can be loaded successfully, and it identified which size and type of DIMMs were installed
    in each slot correctly (see attached dmesg.sb_edac.on.Broadwell-DE.log).

Hi Xiaolong,
   Would you please also test the patch by your LKP method by which the issue was found last time.

Thanks!

BR
Qiuxu 
    
    
    

Download attachment "dmesg.sb_edac.on.Broadwell-DE.log" of type "application/octet-stream" (8714 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ