lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Wed, 28 Sep 2016 19:02:31 +0200
From:   Ondrej Zary <linux@...nbow-software.org>
To:     Sinan Kaya <okaya@...eaurora.org>
Cc:     "Rafael J. Wysocki" <rjw@...ysocki.net>,
        linux-kernel@...r.kernel.org, linux-acpi@...r.kernel.org,
        linux-pci@...r.kernel.org, Bjorn Helgaas <bhelgaas@...gle.com>
Subject: Re: 4.7 regression: ACPI: No IRQ available for PCI Interrupt Link [LNKD]. Try pci=noacpi or acpi=off

On Wednesday 28 September 2016 16:11:39 Sinan Kaya wrote:
> On 9/28/2016 4:32 AM, Ondrej Zary wrote:
> >>> OK
> >>>
> >>> > > Sinan, can you help, please?
> >> >
> >> > Sure, let's see what's going on. I was writing an email.
> >> >
> >> > Can we apply this and collect the kernel log? It also helps to see the
> >> > kernel log from a working combination.
> >
> > This is from yet another machine with the same problem:
>
> Thanks, It sounds like you have more than one machine with similar
> problems. Can you collect the log from the other machines with 4.8-rc8?
>
> and also a boot log with 4.6 kernel where things are working?

The attached logs are from another machine:

dmesg-bad-debug.txt: 4.8-rc8 with your debug patch - bad

dmesg-reverted.txt: 4.8-rc8 with patches (as per Rafael's suggestion) 
reverted - good

dmesg-3.6.txt: 4.6 (Debian kernel) - good


-- 
Ondrej Zary

View attachment "dmesg-bad-debug.txt" of type "text/plain" (31329 bytes)

View attachment "dmesg-4.6.txt" of type "text/plain" (42349 bytes)

View attachment "dmesg-reverted.txt" of type "text/plain" (24043 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ