lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <aYycsIGsth4ob1sU@gmail.com>
Date: Wed, 11 Feb 2026 07:17:28 -0800
From: Breno Leitao <leitao@...ian.org>
To: Tariq Toukan <ttoukan.linux@...il.com>
Cc: Saeed Mahameed <saeedm@...dia.com>, Tariq Toukan <tariqt@...dia.com>, 
	Mark Bloch <mbloch@...dia.com>, Leon Romanovsky <leon@...nel.org>, 
	Andrew Lunn <andrew+netdev@...n.ch>, "David S. Miller" <davem@...emloft.net>, 
	Eric Dumazet <edumazet@...gle.com>, Jakub Kicinski <kuba@...nel.org>, 
	Paolo Abeni <pabeni@...hat.com>, Amir Vadai <amirv@...lanox.com>, netdev@...r.kernel.org, 
	linux-rdma@...r.kernel.org, linux-kernel@...r.kernel.org, dcostantino@...a.com, 
	rneu@...a.com, kernel-team@...a.com
Subject: Re: [PATCH net] net/mlx5e: Skip NAPI polling when PCI channel is
 offline

On Wed, Feb 11, 2026 at 05:44:56AM -0800, Breno Leitao wrote:
> On Wed, Feb 11, 2026 at 01:26:35PM +0200, Tariq Toukan wrote:
> > On 09/02/2026 20:01, Breno Leitao wrote:

> > If the problem is that the WARN_ON is being called at a high rate, then it
> > should be rate-limited.
> 
> That would be a solution as well, and I am happy to pursue it, if that one is
> more appropriate

In fact, I got more inclined to try to fix it in iommu code, let's see how it
goes.

https://lore.kernel.org/all/20260211-dma_io_mmu-v1-1-cf89e24437af@debian.org/

--
pv-bot: closed

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ