lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <2025072222-dose-lifting-e325@gregkh>
Date: Tue, 22 Jul 2025 15:19:58 +0200
From: Greg KH <gregkh@...uxfoundation.org>
To: Ban ZuoXiang <bbaa@...a.fun>
Cc: Baolu Lu <baolu.lu@...ux.intel.com>, iommu@...ts.linux.dev,
	linux-kernel@...r.kernel.org, stable@...r.kernel.org, bbaa@...a.moe
Subject: Re: [REGRESSION][BISECTED] PCI Passthrough / SR-IOV Failure on Stable Kernel ≥
 v6.12.35

On Tue, Jul 22, 2025 at 09:14:08PM +0800, Ban ZuoXiang wrote:
> > Thanks for reporting. Can this issue be reproduced with the latest
> > mainline linux kernel? Can it work if you simply revert this commit?
> >
> > Thanks,
> > baolu 
> 
> Hi, baolu
> 
> The issue cannot be reproduced on the latest mainline kernel (6.16.0-rc7-1-mainline).
> The Ubuntu v6.14-series kernel which also include the commit is also not affected.
> I think the issue only affects the v6.12 series in linux-stable tree. Should I wait for the stable maintainers to solve it?

Nope!  We need your help as you are the one that can reproduce it :)

Are we missing a backport?  Did we get the backport incorrect?  Should
we just revert it?

thanks,

greg k-h

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ