lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <7b377c19-23-6793-5e43-b757cfd8437@panix.com>
Date:   Fri, 4 Feb 2022 15:17:02 -0800 (PST)
From:   "Kenneth R. Crudup" <kenny@...ix.com>
To:     Bjorn Helgaas <helgaas@...nel.org>
cc:     Vidya Sagar <vidyas@...dia.com>, bhelgaas@...gle.com,
        lorenzo.pieralisi@....com, hkallweit1@...il.com,
        wangxiongfeng2@...wei.com, mika.westerberg@...ux.intel.com,
        kai.heng.feng@...onical.com, chris.packham@...iedtelesis.co.nz,
        yangyicong@...ilicon.com, treding@...dia.com, jonathanh@...dia.com,
        abhsahu@...dia.com, sagupta@...dia.com, linux-pci@...r.kernel.org,
        linux-kernel@...r.kernel.org, kthota@...dia.com,
        mmaddireddy@...dia.com, sagar.tv@...il.com,
        "Kenneth R. Crudup" <kenny@...ix.com>
Subject: Re: [PATCH V1] PCI/ASPM: Save/restore L1SS Capability for
 suspend/resume


On Fri, 4 Feb 2022, Bjorn Helgaas wrote:

> Do we have a theory on what might have caused the regression before?
> Or at least something that is different this time around?

If you'd like, I could try re-applying the previous problem commit or your
attempted fix on top of Linus' master if you'd like to see if something was
fixed somewhere else in the PCIe subsystem, but if you think it's not worth-
while I'm satisfied with the current fix (or probably more-exactly for my
particular machine, lack of regression).

	-Kenny

-- 
Kenneth R. Crudup / Sr. SW Engineer, Scott County Consulting, Orange County CA

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ