lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <47BC8E9D.8080309@tomt.net>
Date:	Wed, 20 Feb 2008 21:33:33 +0100
From:	Andre Tomt <andre@...t.net>
To:	David Brownell <david-b@...bell.net>
CC:	linux-kernel@...r.kernel.org, linux-usb@...r.kernel.org
Subject: Re: USB OOPS 2.6.25-rc2-git1

David Brownell wrote:
> On Tuesday 19 February 2008, Andre Tomt wrote:
>>> Can you try this diagnostic patch, to see if it reports any messages
>>> about IAA and/or IAAD oddities?  There's surely a quick workaround
>>> for this, but I'd rather understand the root cause before patching.
>> Doesn't seem to have triggered anything. dmesg attached in case I missed 
>> anything.
> 
> You don't seem to have enabled CONFIG_USB_DEBUG, as the patch instructions
> say is needed to get such diagnostics ... I can tell because the startup
> messages from USB are pretty minimal.  (See appended, vs what you sent...)
> 
> Please try again with USB debugging enabled.

Argh, silly me. Here you go (attached). It has not crashed yet with the 
patch though.

View attachment "dmesg.txt" of type "text/plain" (46731 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ