lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20250822123359.16305-1-ilpo.jarvinen@linux.intel.com>
Date: Fri, 22 Aug 2025 15:33:56 +0300
From: Ilpo Järvinen <ilpo.jarvinen@...ux.intel.com>
To: Bjorn Helgaas <bhelgaas@...gle.com>,
	linux-pci@...r.kernel.org,
	D Scott Phillips <scott@...amperecomputing.com>,
	Rio Liu <rio@....me>,
	Tudor Ambarus <tudor.ambarus@...aro.org>,
	Markus Elfring <Markus.Elfring@....de>
Cc: linux-kernel@...r.kernel.org,
	Christian König <christian.koenig@....com>,
	Ilpo Järvinen <ilpo.jarvinen@...ux.intel.com>
Subject: [PATCH v3 0/3] PCI: Resource fitting algorith fixes

v3 corrects the max() parameters as noticed by Markus.

It would actually be nice if Rio could retest the first patch just
in case. While I expect his problem originated from the size0 block,
there's a small possibility size1 block could have played role in
which case the changed max() could impact the end result.

Once Rio has tested the first patch, these should replace the v2
patches in the pci/resource branch.

v3:
 - Correct max() parameter.
 - Added Rio's full name into tags.
 - Included Closes: tags from the applied v2 changes.

v2:
 - Add fix to resize problem (new patch).

Ilpo Järvinen (3):
  PCI: Relaxed tail alignment should never increase min_align
  PCI: Fix pdev_resources_assignable() disparity
  PCI: Fix failure detection during resource resize

 drivers/pci/setup-bus.c | 38 ++++++++++++++++++++++++++------------
 1 file changed, 26 insertions(+), 12 deletions(-)


base-commit: 8f5ae30d69d7543eee0d70083daf4de8fe15d585
-- 
2.39.5


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ