lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <a3fe40b5-b88e-4d01-0209-6d26b2d384bd@bell.net>
Date:   Sat, 14 May 2022 12:47:00 -0400
From:   John David Anglin <dave.anglin@...l.net>
To:     Sasha Levin <sashal@...nel.org>, Helge Deller <deller@....de>
Cc:     linux-kernel@...r.kernel.org, stable@...r.kernel.org,
        James.Bottomley@...senpartnership.com, linux-parisc@...r.kernel.org
Subject: Re: [PATCH AUTOSEL 5.17 21/21] Revert "parisc: Fix patch code locking
 and flushing"

On 2022-05-14 12:24 p.m., Sasha Levin wrote:
> On Tue, May 10, 2022 at 05:49:31PM +0200, Helge Deller wrote:
>> Hello Sascha,
>>
>> please drop this patch from all your stable-series queues....
>> It shouldn't be backported.
>
> I've dropped it, but... why?
It exposed a problem in the kernel flush code for PA 1.x machines. The patch works okay on
all PA 2.0 machines.  It also works on PA 1.x machines when flush_cache_all is used to flush
changes to memory.

Helge is investigating PA 1.x problem.

-- 
John David Anglin  dave.anglin@...l.net

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ