lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAOtrxKOjNwwAbuhrqTUdiV5M=790FwUetDTkMbRdbkR7bXNH4A@mail.gmail.com>
Date:	Tue, 24 Jan 2012 20:18:05 -0200
From:	Rogério Brito <rbrito@....usp.br>
To:	Yinghai Lu <yinghai@...nel.org>
Cc:	Linus Torvalds <torvalds@...ux-foundation.org>,
	Jesse Barnes <jbarnes@...tuousgeek.org>,
	Ivan Kokshaysky <ink@...assic.park.msu.ru>,
	Edward Donovan <edward.donovan@...ble.net>,
	Thomas Gleixner <tglx@...utronix.de>,
	Bjorn Helgaas <bhelgaas@...gle.com>,
	linux-kernel@...r.kernel.org,
	Márcia Coutinho de Brito <mcbrito@...il.com>,
	Ram Pai <linuxram@...ibm.com>, rui.zhang@...el.com
Subject: Re: [Bug 41722] Clevo M5X0JE hangs in ACPI init

Dear Yinghai, Bjorn, Ram, Linus and other people,

On Thu, Jan 19, 2012 at 17:48, Yinghai Lu <yinghai@...nel.org> wrote:
> 2012/1/19 Rogério Brito <rbrito@....usp.br>:
>>
>> OK, now it seems that we are getting farther. The system boots, even
>> mounts the root filesystem, udev starts and, then, when it seems that
>> some USB messages are going to appear on the screen, the notebook
>> crashes with the same distortion that happened before (with some of
>> the last messages appearing being related to OHCI).
>
> in that case, Can you try to disable OHCI in .config
>
> CONFIG_USB_OHCI_HCD
>
> OHCI controller 00:0b.0 is using
> Memory at b0004000 (32-bit, non-prefetchable) [size=4K]
>
> VGA controller 00:05.0
>        Memory at b2000000 (32-bit, non-prefetchable) [size=16M]
>        Memory at c0000000 (64-bit, prefetchable) [size=256M]
>        Memory at b1000000 (64-bit, non-prefetchable) [size=16M]
>        [virtual] Expansion ROM at 80000000 [disabled] [size=128K]
>
> it seems not related. or could be ioremap etc have problem?
>
> So can you try to boot with nopat?

I have experimented with Linux 3.3.0-rc1-00080-g16111ea, which is a merge of:

* yinghai's usb_smi_disable_early branch with HEAD = a3a6c096
* linus's master branch with HEAD = 4a7cbb56

I have booted the kernel as above, configured, as Yinghai asked, with
OHCI disabled, but no other changes from the previous times.  I
registered in video two boots with only a slight change in options
passed to the kernel, with:

1 - http://youtu.be/fKYubKaNhuc being with options
    `acpi=off pnpbios=off noapic debug ignore_loglevel pci=earlydump
boot_delay=10`

2 - http://youtu.be/Gll9RLfXS_c being with options
    `acpi=off pnpbios=off noapic debug ignore_loglevel pci=earlydump
nopat boot_delay=10`

The only change is the `nopat` option, as suggested by Yinghai.

As you can see in the two videos, some things seem to have progressed:
the kernel actually gets to boot, gets to mount/load the initramfs,
passes things to init and, when it is loading things, I get a hang
with a messed screen, as before.

Among other things, one thing took my attention, which were some messages like:

    ACPI Exception: AE_BAD_PARAMETER, Thread 9340 could not acquire
Mutex [0x1] (20120111/utmutex-276)

which seems strange, particularly as I passed the option `acpi=off` to
my kernel.

I don't know if that's a red herring or not. I can perform other
tests, of course.


Thanks as usual,

-- 
Rogério Brito : rbrito@...e.usp.br,gmail.com} : GPG key 4096R/BCFCAAAA
http://rb.doesntexist.org : Packages for LaTeX : algorithms.berlios.de
DebianQA: http://qa.debian.org/developer.php?login=rbrito%40ime.usp.br
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ