https://bugzilla.novell.com/show_bug.cgi?id=425480
User jkosina@novell.com added comment
https://bugzilla.novell.com/show_bug.cgi?id=425480#c52
--- Comment #52 from Jiri Kosina 2008-09-23 18:00:04 MDT ---
Intel has just posted patches to lkml [1] [2] [3] that mark the memory mapped
EEPROM region as read-only. Therefore if the EEPROM is garbled by any bug in
kernel code, after these patches are applied, the EEPROM would no longer be
overwritten, and stack trace would be dumped instead, which will hopefully
point to the code that is corrupting the memory.
If, however, userspace is corrupting the memory region (most probably X.Org),
then this protection is rendered useless, but it still is worth trying so that
we can potentially rule out either userspace or kernelspace code completely.
I have built the kernel with these three patches applied, for those who are
willing (and able) to test. The kernel RPM can be obtained from
http://labs.suse.cz/jikos/download/bug-425480/
Any testing would be highly appreciated.
[1] http://lkml.org/lkml/2008/9/23/427
[2] http://lkml.org/lkml/2008/9/23/431
[3] http://lkml.org/lkml/2008/9/23/432
--
Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.