lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20070117215054.GA10340@kroah.com>
Date:	Wed, 17 Jan 2007 13:50:54 -0800
From:	Greg KH <greg@...ah.com>
To:	taps@....pl, Bernhard Kaindl <bk@...e.de>
Cc:	linux-kernel@...r.kernel.org
Subject: Re: kernel 2.6.19.1 - Please report the result to linux-kernel to fix this permanently

On Wed, Jan 17, 2007 at 05:04:45PM +0100, =?UTF-8?Q? taps ?= wrote:
> Hello,
> 
> I got this text when I boot my linux :
> 
> --cut--
> 
> PCI quirk: region 1000-107f claimed by ICH4 ACPI/GPIO/TCO
> PCI quirk: region 1180-11bf claimed by ICH4 GPIO
> PCI: Ignoring BAR0-3 of IDE controller 0000:00:1f.1
> PCI: Transparent bridge - 0000:00:1e.0
> PCI: Bus #03 (-#06) is hidden behind transparent bridge #02 (-#02) (try 'pci=assign-busses')
> Please report the result to linux-kernel to fix this permanently
> ACPI: PCI Interrupt Routing Table [\_SB_.PCI0._PRT]
> ACPI: PCI Interrupt Routing Table [\_SB_.PCI0.PCIB._PRT]
> ACPI: PCI Interrupt Link [LNKA] (IRQs *6)
> ACPI: PCI Interrupt Link [LNKB] (IRQs 11) *10
> 
> --cut--
> 
> Kernel 2.6.19.1 without any patch.
> Debian 4.0 Etch.
> Everything works on laptop Toshiba satellite pro L10
> Do you need any more information ?

Bernhard, is there any way we can stop printing out this message?  It
really doesn't seem to be necessary.

thanks,

greg k-h
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ