lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <53757459.4030107@crc.id.au>
Date:	Fri, 16 May 2014 12:13:45 +1000
From:	Steven Haigh <netwiz@....id.au>
To:	David Vrabel <david.vrabel@...rix.com>
CC:	netdev@...r.kernel.org, xen-devel@...ts.xen.org
Subject: Re: [3.15-rc3] Bisected: xen-netback mangles packets between two
 guests on a bridge since merge of "TX grant mapping with SKBTX_DEV_ZEROCOPY
 instead of copy" series.

On 07/05/14 18:16, David Vrabel wrote:
> On 06/05/14 19:07, Steven Haigh wrote:
>> Well, I'm trying to get a test together - although I don't have webdav
>> anywhere... I was going to try it via FTP, however I'm hitting another
>> MM bug in Xen:
>> 	https://bugs.archlinux.org/task/38596
>>
>> This references:
>> 	https://lkml.org/lkml/2014/1/23/596
>>
>> It says that should be fixed in 3.15-rc3 (if I understand properly) -
>> but I'm also hitting that on 3.14.2. Did these changes get ported back
>> to the 3.14 tree?
> 
> This is fixed by 29c7787075 (mm: use paravirt friendly ops for NUMA
> hinting ptes) which is tagged for stable but hasn't yet been picked up
> for 3.14.y.
> 
> You can also work around it by disabling CONFIG_NUMA_BALANCING which
> doesn't work with Xen PV guests anyway.

Hi David,

Just wondering if there has been any movement in getting this into
3.14.y. I see we've now just hit 3.14.4 with no mention of the patch for
issue.

-- 
Steven Haigh

Email: netwiz@....id.au
Web: http://www.crc.id.au
Phone: (03) 9001 6090 - 0412 935 897
Fax: (03) 8338 0299


Download attachment "signature.asc" of type "application/pgp-signature" (837 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ