Bug#679519: same on non-RT kernel (Re: usbhid causes crashes in applications by memory corruption)
On Fri, Jun 29, 2012 at 05:30:01PM +0100, Steve Graham wrote:
> >Is that a standard (non-realtime) kernel? If not, can you also test a
> >standard kernel configuration (linux-image-3.2.0-3-amd64)?
>
> Identical behaviour on linux-image-3.2.0-3-amd64
>
> >Please try booting with the extra kernel parameters:
> >
> > memory_corruption_check=1 memory_corruption_check_size=640K memory_corruption_check_period=5
> >
> >Does that avoid the problem, and if so what does the kernel log show
> >after you plug in the device?
>
> It seems that X86_CHECK_BIOS_CORRUPTION is disabled in the Debian
> kernels. I'm compiling a custom one with it enabled and will post
> any significant results.
Oops, sorry, I thought we had it enabled.
Ben.
--
Ben Hutchings
We get into the habit of living before acquiring the habit of thinking.
- Albert Camus
Reply to: