[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#679519: same on non-RT kernel (Re: usbhid causes crashes in applications by memory corruption)



On Fri, Jun 29, 2012 at 05:30:01PM +0100, Steve Graham wrote:
> >Is that a standard (non-realtime) kernel?  If not, can you also test a
> >standard kernel configuration (linux-image-3.2.0-3-amd64)?
> 
> Identical behaviour on linux-image-3.2.0-3-amd64
> 
> >Please try booting with the extra kernel parameters:
> >
> >   memory_corruption_check=1 memory_corruption_check_size=640K memory_corruption_check_period=5
> >
> >Does that avoid the problem, and if so what does the kernel log show
> >after you plug in the device?
> 
> It seems that X86_CHECK_BIOS_CORRUPTION is disabled in the Debian
> kernels. I'm compiling a custom one with it enabled and will post
> any significant results.
 
Oops, sorry, I thought we had it enabled.

Ben.

-- 
Ben Hutchings
We get into the habit of living before acquiring the habit of thinking.
                                                              - Albert Camus



Reply to: