lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20070313091936.GA23765@janus>
Date:	Tue, 13 Mar 2007 10:19:36 +0100
From:	Frank van Maarseveen <frankvm@...nkvm.com>
To:	Bartlomiej Zolnierkiewicz <bzolnier@...il.com>
Cc:	linux-kernel@...r.kernel.org
Subject: Re: 2.6.20*: PATA DMA timeout, hangs (2)

On Mon, Mar 12, 2007 at 09:40:25PM +0100, Bartlomiej Zolnierkiewicz wrote:
> 
> Hi,
> 
> On Monday 12 March 2007, Frank van Maarseveen wrote:
> > On Mon, Mar 12, 2007 at 01:21:18PM +0100, Bartlomiej Zolnierkiewicz wrote:
> > > 
> > > Hi,
> > > 
> > > Could you check if this is the same problem as this one:
> > > 
> > > http://bugzilla.kernel.org/show_bug.cgi?id=8169
> > 
> > Looks like it except that I don't see "lost interrupt" messages here. So,
> > it might be something different (I don't know).
> 
> From the first mail:
> 
> hda: max request size: 128KiB
> hda: 40021632 sectors (20491 MB) w/2048KiB Cache, CHS=39704/16/63
> hda: cache flushes not supported
>  hda: hda1 hda2 hda4
> 
> It seems that DMA is not used by default (CONFIG_IDEDMA_PCI_AUTO=n),
> so this is probably exactly the same issue.
> 
> Please try the patch attached to the bugzilla bug entry.

2.6.20.2 rejects this patch and I don't see a way to apply it by hand:
ide_set_dma() isn't there, nothing seems to match.

-- 
Frank
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ