lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4F72D1ED.8040305@linx.net>
Date:	Wed, 28 Mar 2012 09:55:09 +0100
From:	Tony Vroon <tony@...x.net>
To:	Dave Airlie <airlied@...ux.ie>,
	DRI mailing list <dri-devel@...ts.freedesktop.org>,
	linux-kernel@...r.kernel.org, Matt Turner <mattst88@...il.com>
Subject: Re: [git pull] drm main pull for 3.4-rc1

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 27/03/12 21:39, Daniel Vetter wrote:
> Yet another thing to try: Can you append intel_iommu=igfx_off to
> your kernel cmdline? If you can, try this both on mainline kernels
> and with my additional patches.

To confirm, intel_iommu=igfx_off is stable on both mainline and your
"for-chainsaw" branch with additional SNB patching.

With ppgtt and the iommu fully enabled, your SNB patches remove the
DMAR warnings but do not address the stability problem, in that it
still crashes in the same way.

Regards,
- -- 
Tony Vroon
UNIX systems administrator
London Internet Exchange Ltd, Trinity Court, Trinity Street,
Peterborough, PE1 1DA
Registered in England number 3137929
E-Mail: tony@...x.net
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.19 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAk9y0e0ACgkQp5vW4rUFj5oTbgCfdY38BXScIWfvEuwdyQr4nwvK
aIMAn3QyLUiEAVxbm2HbufRi8UJXeUa7
=uPoe
-----END PGP SIGNATURE-----
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ