lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <6453C3CB8E2B3646B0D020C112613273C5AC60@sausexmb4.amd.com>
Date:	Tue, 12 Aug 2008 11:03:54 -0500
From:	"Langsdorf, Mark" <mark.langsdorf@....com>
To:	"Rafael J. Wysocki" <rjw@...k.pl>
CC:	"Andrew Morton" <akpm@...ux-foundation.org>,
	"Dave Jones" <davej@...hat.com>,
	"Linus Torvalds" <torvalds@...ux-foundation.org>,
	"LKML" <linux-kernel@...r.kernel.org>,
	<kernel-testers@...r.kernel.org>,
	"Randy Dunlap" <randy.dunlap@...cle.com>,
	"Arnold, Frank" <Frank.Arnold@....com>
Subject: RE: [Regression] 2.6.27-rc2-git4: suspend and power off fails on Asus M3A32-MVP


> Unfortunately, your commit 34ae7f35a21694aa5cb8829dc5142c39d73d6ba0
> ("[CPUFREQ][2/2] preregister support for powernow-k8") causes 
> a power off/
> suspend/ hibernation regression on my test box with the Asus M3A32-MVP
> mainboard (AMD 790 chipset) and the Phenom 9850 CPU.
> 
> Apparently, the patch causes a crash in a CPU hotplug 
> notifier to happen, but I'm not really sure of that, since there are a
lot of stack 
> traces resulting from it and I'm unable to capture them over a serial
console.
> 
> It is sufficient to revert commit 
> 34ae7f35a21694aa5cb8829dc5142c39d73d6ba0 to
> make things work again.

Thanks for the clear report.  I'll look into it and try to fix it.

-Mark Langsdorf
Operating System Research Center
AMD

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ