lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <1232097368.3120.5.camel@odie.local>
Date:	Fri, 16 Jan 2009 10:16:08 +0100
From:	Simon Holm Thøgersen <odie@...aau.dk>
To:	Alan Stern <stern@...land.harvard.edu>
Cc:	Greg Kroah-Hartman <gregkh@...e.de>,
	"Rafael J. Wysocki" <rjw@...k.pl>,
	linux-kernel <linux-kernel@...r.kernel.org>,
	linux-usb@...r.kernel.org
Subject: Re: regression: a0d4922 causes PCI host constroller problems

fre, 16 01 2009 kl. 09:05 +0100, skrev Simon Holm Thøgersen:
> commit a0d4922 ("USB: fix up suspend and resume for PCI host
> controllers") causes a lot of these two lines to be logged:
> 
> uhci_hcd 0000:00:1d.2: host system error, PCI problems?
> uhci_hcd 0000:00:1d.2: host controller process error, something bad
> happened!
> 
> Normally they appear on resume after suspend to disk, but sometimes I'm
> not even sure I had to suspend to disk to see them. Also, it seems like
> they don't trigger if X has not been started, or at least they are much
> less likely to.
> 
> Reverting the patch restores normal operation.
> 
> No USB devices were attached BTW.

So this one has already been reported [1]. There was some mentioning of
a patch to try out instead of reverting, but I couldn't find it.

Rafael, did you have something else to suggest or can we please get a
revert of this one upstream asap before too many are wasting their time
on this one?

[1] http://lkml.org/lkml/2009/1/11/98


Simon Holm Thøgersen

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ