lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 22 Jul 2009 10:12:51 -0700
From:	Jesse Barnes <jbarnes@...tuousgeek.org>
To:	Alberto Gonzalez <alberto6674@...il.com>
Cc:	Alberto Gonzalez <alberto6674@...il.com>,
	Michal Soltys <soltys@....info>,
	Dave Airlie <airlied@...ux.ie>,
	Kay Sievers <kay.sievers@...y.org>,
	linux-kernel@...r.kernel.org, linux-hotplug@...r.kernel.org
Subject: Re: Kernel 2.6.30 and udevd problem

On Wed, 22 Jul 2009 18:51:20 +0200
Alberto Gonzalez <alberto6674@...il.com> wrote:

> On Wednesday 22 July 2009 18:08:34 Jesse Barnes wrote:
> > On Wed, 22 Jul 2009 15:25:29 +0200
> > Alberto Gonzalez <alberto6674@...il.com> wrote:
> > > Ok, I caught a complete log from boot to when the problem starts.
> > > There doesn't seem to be anything significantly different, but
> > > just in case.
> >
> > Oh I guess this is without the debug patch I attached...  this one
> > should be a bit less noisy but tell me which bit is stuck.
> 
> Actually it was with the debug patch found here applied:
> 
> http://lkml.org/lkml/2009/7/2/290
> 
> Now I captured another one with the latest patch. This time the
> problem started after opening Amarok.
> 

Ah I must have been looking at the wrong register.  This one makes it
look like one of your HDMI hotplug bits is getting stuck (HDMIC in
particular).  This might not even be wired up on your platform...

This test hack should prevent us from responding to those interrupts...

-- 
Jesse Barnes, Intel Open Source Technology Center

View attachment "i915-g4x-hotplug-hack.patch" of type "text/x-patch" (563 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ