Comment 284 for bug 263555

Revision history for this message
In , Jkosina-d (jkosina-d) wrote :

Intel has just posted patches to lkml [1] [2] [3] that mark the memory mapped EEPROM region as read-only. Therefore if the EEPROM is garbled by any bug in kernel code, after these patches are applied, the EEPROM would no longer be overwritten, and stack trace would be dumped instead, which will hopefully point to the code that is corrupting the memory.

If, however, userspace is corrupting the memory region (most probably X.Org), then this protection is rendered useless, but it still is worth trying so that we can potentially rule out either userspace or kernelspace code completely.

I have built the kernel with these three patches applied, for those who are willing (and able) to test. The kernel RPM can be obtained from

        http://labs.suse.cz/jikos/download/bug-425480/

Any testing would be highly appreciated.

[1] http://lkml.org/lkml/2008/9/23/427
[2] http://lkml.org/lkml/2008/9/23/431
[3] http://lkml.org/lkml/2008/9/23/432