lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <3908561D78D1C84285E8C5FCA982C28F7F5D49A9@ORSMSX115.amr.corp.intel.com>
Date:   Tue, 7 Apr 2020 19:53:56 +0000
From:   "Luck, Tony" <tony.luck@...el.com>
To:     Borislav Petkov <bp@...en8.de>
CC:     Yazen Ghannam <Yazen.Ghannam@....com>, X86 ML <x86@...nel.org>,
        LKML <linux-kernel@...r.kernel.org>
Subject: RE: [PATCH 0/9 v3] New way to track mce notifier chain actions

> The last patch is something tglx spotted yesterday and fixing that with
> the MCE flags is pretty easy - was boxing with a wrapper struct around
> struct mce and that gets really ugly.
>
> Tony, I'm open to suggestions how to test it - I probably don't have an
> access to such box which can trigger read errors on nvdimms or what was
> the use case?

It passes my smoke tests (uncorrectable error consumed by application and
uncorrectable error consumed by mcsafe_memcpy()).

Tested-by: Tony Luck <tony.luck@...el.com>

-Tony

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ