lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <w4y5tgwn4k.wl%peter@chubb.wattle.id.au>
Date:	Tue, 10 Jan 2012 09:02:19 +1100
From:	Peter Chubb <peter.chubb@...ta.com.au>
To:	Will.deacon@....org
CC:	linux-kernel@...r.kernel.org, kexec@...ts.infradead.org,
	linux-omap@...r.kernel.org
Subject: USB Host port inoperative after kexec on Beagleboard


Hi Will,
   Thanks for the fixes to kexec for ARM that went into mainline this
   week.  Mostly things work now.

   One issue: the USB EHCI port on the (rev C2) beagleboard doesn't
   work after a kexec.  During boot after kexec, the host device is
   detected and initialised, but nothing plugged in works, even when
   everything was working corectly before the kexec.  Das U-boot
   must set up something that is then undone during the kexec reboot.

   I've traced all calls to clk_enable() and clk_disable(), and
   everything looks all right --- in particular I can't see 
   anything explicitly disabled during kexec that isn't reenabled
   during boot of the subsequent kernel.

   Voltages that I can measure look correct on the port.

   Do you have any suggestions as to what else could be wrong?
--
Dr Peter Chubb  http://www.gelato.unsw.edu.au  peterc AT gelato.unsw.edu.au
http://www.ertos.nicta.com.au           ERTOS within National ICT Australia
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ