lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 14 Jul 2010 17:55:43 +0200
From:	Stephan Wolf <stephan@...zte-bankreihe.de>
To:	linux-kernel@...r.kernel.org
CC:	torvalds@...ux-foundation.org, tglx@...utronix.de
Subject: [PATCH] enable readback to get HPET working on ATI SB4x00, kernel
 2.6.35_rc5

  After commit 30a564be9d9554c168a654eddc2165869cc0d7bf 
"x86, hpet: Restrict read back to affected ATI chipsets" hpet did not 
work anymore on HP nx6325. The machine hangs on booting until a 
keystroke was taken. After a short time machine hangs again until next 
keystroke. Applying the following patch solves the issue for me.

diff --git a/arch/x86/kernel/quirks.c b/arch/x86/kernel/quirks.c
index e72d3fc..8d28924 100644
--- a/arch/x86/kernel/quirks.c
+++ b/arch/x86/kernel/quirks.c
@@ -408,6 +408,7 @@ static void ati_force_enable_hpet(struct pci_dev *dev)
      dev_printk(KERN_DEBUG, &dev->dev, "Force enabled HPET at 0x%lx\n",
             force_hpet_address);
      cached_dev = dev;
+    hpet_readback_cmp = 1;
  }
  DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_ATI, 
PCI_DEVICE_ID_ATI_IXP400_SMBUS,
               ati_force_enable_hpet);

Signed-off-by: Stephan Wolf <stephan@...zte-bankreihe.de>
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ