lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <561B2442.9050600@erley.org>
Date:	Sun, 11 Oct 2015 20:08:50 -0700
From:	Pat Erley <pat-lkml@...ey.org>
To:	Al Stone <ahs3@...hat.com>, "Rafael J. Wysocki" <rjw@...ysocki.net>
Cc:	Hanjun Guo <guohanjun@...wei.com>, Al Stone <al.stone@...aro.org>,
	linux-acpi@...r.kernel.org, linux-arm-kernel@...ts.infradead.org,
	linaro-kernel@...ts.linaro.org, linux-ia64@...r.kernel.org,
	patches@...aro.org, linux-pm@...r.kernel.org,
	linaro-acpi@...ts.linaro.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH v5 0/5] Provide better MADT subtable sanity checks

On 10/05/2015 10:12 AM, Al Stone wrote:
> On 10/05/2015 07:39 AM, Rafael J. Wysocki wrote:
>> On Wednesday, September 30, 2015 10:10:16 AM Al Stone wrote:
>>> On 09/30/2015 03:00 AM, Hanjun Guo wrote:
>>>> On 2015/9/30 7:45, Al Stone wrote:
>>>>> NB: this patch set is for use against the linux-pm bleeding edge branch.
>>>>>
>>>
>>> [snip...]
>>>
>>>>
>>>> For this patch set,
>>>>
>>>> Reviewed-by: Hanjun Guo <hanjun.guo@...aro.org>
>>>>
>>>> Thanks
>>>> Hanjun
>>>
>>> Thanks, Hanjun!
>>
>> Series applied, thanks!
>>
>> Rafael
>>
>
> Thanks, Rafael!
>

Just decided to test out linux-next (to see the new nouveau cleanups). 
This change set prevents my Lenovo W510 from booting properly.

Reverting: 7494b0 "ACPI: add in a bad_madt_entry() function to 
eventually replace the macro"

Gets the system booting again.  I'm attaching my dmesg from the failed 
boot, who wants the acpidump?

View attachment "broken-madt.txt" of type "text/plain" (81623 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ