lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <E5BA70BA-D560-4C4C-BEC7-83E7D6407070@linaro.org>
Date:   Wed, 10 Apr 2019 11:33:43 +0200
From:   Paolo Valente <paolo.valente@...aro.org>
To:     Pavel Machek <pavel@....cz>
Cc:     Jens Axboe <axboe@...nel.dk>,
        kernel list <linux-kernel@...r.kernel.org>,
        linux-block <linux-block@...r.kernel.org>, rjw@...ysocki.net,
        lenb@...nel.org, linux-acpi@...r.kernel.org
Subject: Re: Thinkpad X60: regression with 5.1-rc1 and 5.1-rc4



> Il giorno 10 apr 2019, alle ore 11:30, Pavel Machek <pavel@....cz> ha scritto:
> 
> Hi!
> 
>>> I now noticed it said:
>>> 
>>> EIP is in bfq_bfqq_expire
>>> 
>>>> Can you try and revert:
>>>> 
>>>> 9dee8b3b057e1
>>>> 
>>>> and see if that helps?
>>> 
>>> Yes, I tried and yes, it helps. What are the next steps? 
>>> 
>> 
>> Try my fix:
>> 
>> https://lore.kernel.org/linux-block/20190409191420.3f56d493@fire.localdomain/T/#m30a14045e710b870f00f7c51cdaa7c403977b767
>> 
>> and cross your fingers :)
> 
> It seems to work... even without fingers crossed.
> 

Great!  I've submitted a final version of this fix patch a few minutes
ago (not yet archived anywhere, sorry).

Thanks,
Paolo

> Tested-by: Pavel Machek <pavel@....cz>
> 									Pavel
> -- 
> (english) http://www.livejournal.com/~pavelmachek
> (cesky, pictures) http://atrey.karlin.mff.cuni.cz/~pavel/picture/horses/blog.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ