lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Tue, 9 Apr 2019 18:35:35 +0200
From:   Paolo Valente <paolo.valente@...aro.org>
To:     Pavel Machek <pavel@....cz>
Cc:     Jens Axboe <axboe@...nel.dk>,
        kernel list <linux-kernel@...r.kernel.org>,
        linux-block <linux-block@...r.kernel.org>, rjw@...ysocki.net,
        lenb@...nel.org, linux-acpi@...r.kernel.org
Subject: Re: Thinkpad X60: regression with 5.1-rc1 and 5.1-rc4



> Il giorno 9 apr 2019, alle ore 18:33, Pavel Machek <pavel@....cz> ha scritto:
> 
> On Mon 2019-04-08 11:41:18, Jens Axboe wrote:
>> On 4/8/19 11:39 AM, Pavel Machek wrote:
>>> Hi!
>>> 
>>> For some reason, Thinkpad X60 now crashes during boot. I see some
>>> weird backtraces, and it may be bfq related... or maybe ACPI idle.
>>> 
>>> Does x86-32 work for you?
>>> 
>>> Weird thing is, 5.1.0-rc3-next-20190408 boots here (but later has
>>> problems during resume, making it unusable, too). They may not have
>>> 100% same configs.
> 
> I now noticed it said:
> 
> EIP is in bfq_bfqq_expire
> 
>> Can you try and revert:
>> 
>> 9dee8b3b057e1
>> 
>> and see if that helps?
> 
> Yes, I tried and yes, it helps. What are the next steps? 
> 

Try my fix:

https://lore.kernel.org/linux-block/20190409191420.3f56d493@fire.localdomain/T/#m30a14045e710b870f00f7c51cdaa7c403977b767

and cross your fingers :)

Thanks,
Paolo

> 									Pavel
> 
> -- 
> (english) http://www.livejournal.com/~pavelmachek
> (cesky, pictures) http://atrey.karlin.mff.cuni.cz/~pavel/picture/horses/blog.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ