Bug#679519: same on non-RT kernel ( usbhid causes crashes in applications by memory corruption)
On Fri, Jun 29, 2012 at 05:30:01PM +0100, Steve Graham wrote:
> >Is that a standard (non-realtime) kernel? If not, can you also test a
> >standard kernel configuration (linux-image-3.2.0-3-amd64)?
> Identical behaviour on linux-image-3.2.0-3-amd64
> >Please try booting with the extra kernel parameters:
> > memory_corruption_check=1 memory_corruption_check_size=640K memory_corruption_check_period=5
> >Does that avoid the problem, and if so what does the kernel log show
> >after you plug in the device?
> It seems that X86_CHECK_BIOS_CORRUPTION is disabled in the Debian
> kernels. I'm compiling a custom one with it enabled and will post
> any significant results.
Oops, sorry, I thought we had it enabled.
We get into the habit of living before acquiring the habit of thinking.
- Albert Camus
To UNSUBSCRIBE, email to debian-kernel-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact firstname.lastname@example.org