lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <200702091237.24576.rototor@rototor.de>
Date:	Fri, 9 Feb 2007 12:37:24 +0100
From:	Emmeran Seehuber <rototor@...otor.de>
To:	Tejun Heo <htejun@...il.com>
Cc:	linux-kernel@...r.kernel.org
Subject: Re: 2.6.18.2: sporadic SATA port resets (Broadcom BCM5785 (HT1000))

Am Friday 09 February 2007 schrieb Tejun Heo:
> Hi,

>
> This is just the recovery part.  Need more log.  If possible, please
> give a shot at 2.6.20.  It might have fixed your problem or at least
> allow better diagnosis.
>

I´ll look into getting 2.6.20 on the machine. But it might take some time till 
we can do this.

> > Does somebody have a glue whats going on here? Could it be a hardware
> > failure?
>
> It might be.  Quite some SATA bug reports turn out to be hardware
> problem, most commonly PSU issues.

The power supply unit (you meant this with PSU, didn`t you?) has 800 Watt, so 
it should be powerfull enough for one harddisk and no graphics board.

> > Do you need additional information?
>
> Yeah, please post the content of /var/log/boot.msg if available and the
> result of dmesg and lspci -nn.

We don`t have a /var/log/boot.msg, but it seems the boot messages were saved 
in /var/log/dmesg, so I attached it.

Thanks for your effort.

cu,
  Emmy

View attachment "lspci-nn.txt" of type "text/plain" (1945 bytes)

Download attachment "dmesg.txt.gz" of type "application/x-gzip" (1191 bytes)

Download attachment "boot.dmesg.txt.gz" of type "application/x-gzip" (7357 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ