lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Sun, 4 Mar 2018 19:15:15 +0100 (CET)
From:   Stefan Wahren <stefan.wahren@...e.com>
To:     Michal Suchánek <msuchanek@...e.de>
Cc:     Eric Anholt <eric@...olt.net>,
        bcm-kernel-feedback-list@...adcom.com,
        Stefan Schake <stschake@...il.com>,
        linux-kernel@...r.kernel.org, Ray Jui <rjui@...adcom.com>,
        Scott Branden <sbranden@...adcom.com>,
        Florian Fainelli <f.fainelli@...il.com>,
        linux-rpi-kernel@...ts.infradead.org,
        Phil Elwell <phil@...pberrypi.org>,
        Gerd Hoffmann <kraxel@...hat.com>, linux-mmc@...r.kernel.org,
        Ulf Hansson <ulf.hansson@...aro.org>,
        Julia Lawall <Julia.Lawall@...6.fr>,
        "Gustavo A. R. Silva" <garsilva@...eddedor.com>,
        linux-arm-kernel@...ts.infradead.org
Subject: Re: [PATCH 1/2] mmc: bcm2835: reset host on timeout

Hi Michal,

> Michal Suchánek <msuchanek@...e.de> hat am 4. März 2018 um 17:36 geschrieben:
> 
> 
> On Sat, 3 Mar 2018 14:58:45 +0100 (CET)
> Stefan Wahren <stefan.wahren@...e.com> wrote:
> 
> > In a github issue, i've read that badblocks could reproduce the issue
> > more likely.
> 
> How many iterations of badblocks? It doe snot reproduce the issue for
> me.

i asked for the parameters here:

https://github.com/raspberrypi/linux/issues/2392

Stefan

> 
> Thanks
> 
> Michal

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ