the whole pt_regs
patch (commit 49d26b6eaa8e970c8cf6e299e6ccba2474191bf5) from
kernel.org and see if that has a beneficial effect.
-Bill
----
William Cattey
Linux Platform Coordinator
MIT Information Services & Technology
N42-040M, 617-253-0140, [EMAIL PROTECTED]
http://web.mit.edu/wdc/w
f the
call to audit_syscall_exit.
Here's my patch. Where did I screw up?
linux-2.6-correct-vm86-audit-foonly.patch
Description: Binary data
-Bill
----
William Cattey
Linux Platform Coordinator
MIT Information Services & Technology
N42-040M, 617-253-0140, [EMAIL PROTECTED]
http
t the subset that affects the audit calls?
Thanks in advance,
-Bill Cattey
----
William Cattey
Linux Platform Coordinator
MIT Information Services & Technology
N42-040M, 617-253-0140, [EMAIL PROTECTED]
http://web.mit.edu/wdc/www/
On Sep 28, 2007, at 8:58 PM, Jeremy Fitzhardinge wrote:
hat pieces are
required to test and see if the bug really got fixed with his cleanup?
I'd feel a lot more confident we were on the right track if I could
just correctly patch Fitzhardinge's cleanup into the test setup I
have now.
-Bill
William Cattey
Linux Platform C
e's a race condition with memory not being
where it's expected to be when a large app calls out to real mode?
-Bill
William Cattey
Linux Platform Coordinator
MIT Information Services & Technology
W92-176, 617-253-0140, [EMAIL PROTECTED]
http://web.mit.edu/wdc/www/
On Aug 14
.
When we put a known value in each byte of the buffer before making
the vm86 call, the known data would always be overwritten either with
EDID data or zeros.
-Bill
William Cattey
Linux Platform Coordinator
MIT Information Services & Technology
W92-176, 617-253-0140, [EMAIL PROTE
6 matches
Mail list logo