lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4C8F04DC.5060303@xs4all.nl>
Date:	Tue, 14 Sep 2010 07:15:08 +0200
From:	Udo van den Heuvel <udovdh@...all.nl>
To:	Robert Hancock <hancockrwd@...il.com>
CC:	linux-kernel@...r.kernel.org
Subject: patch: HPET force enable for CX700 / VIA Epia LT  was: Re: hpet timers
 gone?

On 2010-09-14 01:16, Robert Hancock wrote:
> On Mon, Sep 13, 2010 at 8:52 AM, Udo van den Heuvel <udovdh@...all.nl> wrote:
>> So what else can I do to enable HPET?
> 
> At this point, not much, unless you can track down the chipset
> information that would allow us to implement force enabling HPET on
> that chipset..

Signed-off-by: Udo van den Heuvel <udovdh@...all.nl>

--- a/arch/x86/kernel/quirks.c	2010-09-13 18:02:14.639710309 +0200
+++ b/arch/x86/kernel/quirks.c	2010-09-13 18:02:06.095280815 +0200
@@ -344,6 +344,8 @@
 			 vt8237_force_enable_hpet);
 DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_VIA, PCI_DEVICE_ID_VIA_8237,
 			 vt8237_force_enable_hpet);
+DECLARE_PCI_FIXUP_HEADER(PCI_VENDOR_ID_VIA, PCI_DEVICE_ID_VIA_CX700,
+			 vt8237_force_enable_hpet);

 static void ati_force_hpet_resume(void)
 {

Patch does make hpet appear on VIA Epia LT (CX700M2 chipset) with
hpet=force on kernel commandline.


Udo

View attachment "hpet-c700.patch" of type "text/plain" (436 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ