Re: amd64/148078: wireless networking stops functioning

2010-06-23 Thread Oliver Pinter
The following reply was made to PR amd64/148078; it has been noted by GNATS.

From: Oliver Pinter 
To: Paul Lambert 
Cc: freebsd-gnats-sub...@freebsd.org
Subject: Re: amd64/148078: wireless networking stops functioning
Date: Wed, 23 Jun 2010 11:52:47 +0200

 hi!
 
 under 7.3-STABLE is the same problem, on boot +2-3 minutes the
 networking is ok, but after 2-3 minutes, it going down. The soultion
 is this:
 
 ifconfig_ath0="DHCP WPA protmode rtscts mode 11g -bgscan -burst
 channel 12 -powersave"
 
 It's an ar5212 tp-link wlan card.
 
 
 On 6/23/10, Paul Lambert  wrote:
 >
 >>Number: 148078
 >>Category:   amd64
 >>Synopsis:   wireless networking stops functioning
 >>Confidential:   no
 >>Severity:   critical
 >>Priority:   high
 >>Responsible:freebsd-amd64
 >>State:  open
 >>Quarter:
 >>Keywords:
 >>Date-Required:
 >>Class:  update
 >>Submitter-Id:   current-users
 >>Arrival-Date:   Wed Jun 23 03:10:05 UTC 2010
 >>Closed-Date:
 >>Last-Modified:
 >>Originator: Paul Lambert
 >>Release:8.1 prerelease
 >>Organization:
 > BRSINC
 >>Environment:
 > FreeBSD BRSINC-VM02.local 8.0-RELEASE FreeBSD 8.0-RELEASE #0: Sat Nov 21
 > 15:02:08 UTC 2009
 > r...@mason.cse.buffalo.edu:/usr/obj/usr/src/sys/GENERIC  amd64
 >
 >>Description:
 > I finally found time to work with Freebsd 8.0 release from last fall.  After
 > struggling to find the correct configuration I was able to get my wireless
 > interface working just great.  In an attempt to get Gnome 2.3 loaded I
 > performed a freebsd-update to 8.1 prerelease.  After running install and
 > rebooting twice the system booted up with the wlan0 device stating
 > "associated."  However, no network response was forth coming.  After
 > researching this on the web I found a blog that stated to insert the line
 > synchonous_dhclient="yes."  I did and the network interface was able to
 > perform pings and traceroutes.  But when I went to download a new package
 > the network froze.  Again, I researched the web and found instructions to
 > add if_vlan_load and vaps_ath0="wlan0".  Adding these did not make matters
 > any better.  I then "rolled back" the Freebsd to 8.0 release and changed the
 > conf files back and the network is up and running as expected.
 >
 > 8.0 release config files
 >
 > rc.conf
 > wlans_ath0="wlan0"
 > ifconfig_wlan0="WPA DHCP"
 >
 > loader.conf
 > wlan_wep_load="YES"
 > wlan_ccmp_load="YES"
 > wlan_tkip_load="YES"
 >
 > wpa_supplicant.conf
 > eapol_version=1
 > ap_scan=1
 > fast_reauth=1
 > #
 > network={
 >  ssid="my wireless AP"
 >  psk="my AP password"
 > }
 >
 >
 >>How-To-Repeat:
 > upgrade to 8.1 prerelease
 >>Fix:
 >
 >
 >>Release-Note:
 >>Audit-Trail:
 >>Unformatted:
 > ___
 > freebsd-amd64@freebsd.org mailing list
 > http://lists.freebsd.org/mailman/listinfo/freebsd-amd64
 > To unsubscribe, send any mail to "freebsd-amd64-unsubscr...@freebsd.org"
 >
___
freebsd-amd64@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-amd64
To unsubscribe, send any mail to "freebsd-amd64-unsubscr...@freebsd.org"


Re: amd64/153746: kernel crash with 2 X11 sessions on amd64 with radeon drm

2011-01-07 Thread Oliver Pinter
http://lists.freebsd.org/pipermail/freebsd-x11/2010-February/009370.html
http://old.nabble.com/freebsd7,-radeon,-xorg-server-->-deadlock-or-so-td27524122.html

On 1/7/11, fbsdm...@dnswatch.com  wrote:
>
> On Thu, January 6, 2011 2:45 pm, Patrick Mackinlay wrote:
>>
>
>>> Number: 153746
>>> Category:   amd64
>>> Synopsis:   kernel crash with 2 X11 sessions on amd64 with radeon
>>> drm
>>> Confidential:   no
>>> Severity:   non-critical
>>> Priority:   medium
>>> Responsible:freebsd-amd64
>>> State:  open
>>> Quarter:
>>> Keywords:
>>> Date-Required:
>>> Class:  sw-bug
>>> Submitter-Id:   current-users
>>> Arrival-Date:   Thu Jan 06 22:50:07 UTC 2011
>>> Closed-Date:
>>> Last-Modified:
>>> Originator: Patrick Mackinlay
>>> Release:8.1-RELEASE-p2 (affects 8.0 as well)
>>> Organization:
>>> Environment:
>>>
>> FreeBSD patrick.uknet.spacesurfer.com 8.1-RELEASE-p2 FreeBSD
>> 8.1-RELEASE-p2 #3: Thu Jan  6 21:40:18 GMT 2011
>> r...@patrick.uknet.spacesurfer.com:/usr/obj/usr/src/sys/PATRICK  amd64
>>
>>> Description:
>>>
>> If I start 2 X11 sessions (startx and start -- :1). The close the
>> sessions on display :1, when I switch to the session on display :0 the
>> system reboots. I have an amd64 with a ATI radeon card:
>>
>> drm0:  on vgapci0
>>
>>
>> Note that if I never close either X11 session there is no problem with
>> stability (weeks uptime), however the only graphics intensive app I use
>> is mplayer. mplayer is the only reason I need drm, however the bug will
>> be triggered even if I havn't used mplayer in my X11 session.
> Greetings,
>  Fact is, Mplayer has nothing to do with when/how drm is loaded. 2
> possibilities exist for loading; @boot via loader.conf(5), or when
> starting X via xorg.conf(5).
> If you're loading it via xorg.conf(5), and suspect drm to be the culprit.
> The easiest solution would be to comment the line that loads it in your
> xorg.conf(5) file. Then startx(1), and see if there's any difference in
> behavior. FWIW I haven't been able to use HALd on _any_ 64bit box. So
> against the suggested entries in rc.conf(8):
> dbus_enable="YES"
> hald_enable="YES"
>
> I need to use
>
> hald_enable="NO"
> or I have big problems running X. I only mention it, in case this
> might also apply to your situation.
>
> HTH
>
> --Chris
>
>>
>> I will attach the output from dmesg with my full system setup and the
>> output from the two xorg log files.
>>> How-To-Repeat:
>>>
>>
>>> Fix:
>>>
>>
>>
>>> Release-Note:
>>> Audit-Trail:
>>> Unformatted:
>>>
>> ___
>> freebsd-amd64@freebsd.org mailing list
>> http://lists.freebsd.org/mailman/listinfo/freebsd-amd64
>> To unsubscribe, send any mail to "freebsd-amd64-unsubscr...@freebsd.org"
>>
>>
>
>
> --
> kern:
> FreeBSD 8.1-RELEASE amd64
>
>
> ___
> freebsd-amd64@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-amd64
> To unsubscribe, send any mail to "freebsd-amd64-unsubscr...@freebsd.org"
>
___
freebsd-amd64@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-amd64
To unsubscribe, send any mail to "freebsd-amd64-unsubscr...@freebsd.org"


UEFI secure bootloader from ferdora

2012-06-03 Thread Oliver Pinter
https://github.com/mjg59/shim
http://hup.hu/cikkek/20120603/a_fedora_megoldasa_az_uefi_secure_boot_mizeriara
http://mjg59.dreamwidth.org/12368.html?thread=406864
___
freebsd-amd64@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-amd64
To unsubscribe, send any mail to "freebsd-amd64-unsubscr...@freebsd.org"


amd64/179282: [PATCH] Intel SMAP for FreeBSD-CURRENT

2013-06-03 Thread Oliver Pinter

>Number: 179282
>Category:   amd64
>Synopsis:   [PATCH] Intel SMAP for FreeBSD-CURRENT
>Confidential:   no
>Severity:   non-critical
>Priority:   low
>Responsible:freebsd-amd64
>State:  open
>Quarter:
>Keywords:   
>Date-Required:
>Class:  change-request
>Submitter-Id:   current-users
>Arrival-Date:   Mon Jun 03 23:10:01 UTC 2013
>Closed-Date:
>Last-Modified:
>Originator: Oliver Pinter
>Release:FreeBSD 10-CURRENT
>Organization:
>Environment:
>Description:
As subpart of my thesis, I implemented Intel SMAP[1] support for FreeBSD.
The current stable version of patch (attached) have compile time
option to enable SMAP.*

A feature complete dynamic version is expected by the end of the
month, which patched the kernel on boot time, when the feautre
presented in CPU.

[1] http://lwn.net/Articles/517475/

patches: https://github.com/opntr/freebsd-patches-2013-tavasz
smap-test: https://github.com/opntr/freebsd-smap-tester

>How-To-Repeat:

>Fix:


Patch attached with submission follows:

>From ae18b374b38401f736e4e13a8ab5fab82985df2b Mon Sep 17 00:00:00 2001
From: Oliver Pinter 
Date: Tue, 16 Apr 2013 01:32:25 +0200
Subject: [PATCH] added SMAP support for FreeBSD against r250423

This patch implemented support for Intel's new protection technology.

Supervisor Mode Access Prevention (SMAP) is newest security feature from
Intel, which first appears in the Haswell Line of processors.

When SMAP enabled, the kernel cannot access pages that are in userspace.
In some cases the kernel does have to access user pages, for this reason
the technology provided two instruction, to temporarily disable this
protection.

When SMAP detect protection violation, the kernel must call panic().

Intel's SMAP documentation:
http://software.intel.com/sites/default/files/319433-014.pdf

Test case:
https://github.com/opntr/freebsd-smap-tester

some parts of this patch discussed with kib freebsd org and Hunger

Signed-off-by: Oliver Pinter 

--

* added void clac(void) and void stac(void) to cpufunc.h
* added STAC/CLAC instruction and added config options
* added basic support for SMAP
* added stac/clac in support.S around userspace memory access
* added RFLAGS.AC clearing to exception.S related to SMAP
* added RFLAGS.AC clearing to ia32_exception.S related to SMAP
* added RFLAGS.AC clearing to asmacros.h related to SMAP
* clac and stac functions depend on INTEL_SMAP
* added trap handler to SMAP

For security reason, when PF occured by SMAP, the kernel should paniced.

" [...]

The above items imply that the error code delivered by a page-fault
exception due to SMAP is either 1 (for reads) or 3 (for writes).
Note that the only page-fault exceptions that deliver an error code
of 1 are those induced by SMAP. (If CR0.WP = 1, some page-fault
exceptions may deliver an error code of 3 even if CR4.SMAP = 0.)

[...]" - intel 319433-014.pdf 9.3.3

* Clear the RFLAGS.AC on the start of nmi handler

suggested by kib@:
> I think that NMI handler should have CLAC executed unconditionally and
> much earlier then it is done in your patch. Since NMI could interrupt
> the copy*() functions, you would get some kernel code unneccessary
> executing with SMAP off.

* added note to fault handlers related to SMAP

suggested by kib@:
> I believe that exception labels in the support.S, like copyout_fault
> etc
> deserve a comment describing that EFLAGS.AC bit gets cleared by the
> exception entry point before the control reaches the label.

* added AC flag checking and factor out SMAP checking in trap_pfault() to make 
it more readable and

partially suggested by kib:
> The trap_pfault() fragment should check for the error code equal to 1 or
> 3, as described in the 9.3.3, instead of only checking for the present
> bit set. More, I suggest you to explicitely check that the #PF exception
> came from the kernel mode and that EFLAGS.AC was also set, before
> decidingto panic due to SMAP-detected failure.

* build fix, when INTEL_SMAP has not set in kernel config

/usr/home/op/git/freebsd-base.git.http/sys/amd64/amd64/trap.c:889:1: error: 
unused function 'smap_access_violation' [-Werror,-Wunused-function]
smap_access_violation(struct trapframe *frame, int usermode)
^
1 error generated.
*** [trap.o] Error code 1
1 error
*** [buildkernel] Error code 2
1 error
*** [buildkernel] Error code 2
1 error

* fixed smap_access_violation(...), spotted by Hunger

* fix smap_access_violatrion() when the CPU does not support SMAP

* use the CLAC and STAC macro, instead of the .byte sequence

* added memory clobber to clac and stac inline assembly

clac and stac are sensitive instructions,
to prevent instruction reordering added memory clobber

spotted by Hunger, PaXTeam

Signed-off-

Re: amd64/179282: [PATCH] Intel SMAP for FreeBSD-CURRENT

2014-05-05 Thread Oliver Pinter
I'm working on this, as part of FreeBSD GSoC2014.

On 6/4/13, freebsd-gnats-sub...@freebsd.org
 wrote:
> Thank you very much for your problem report.
> It has the internal identification `amd64/179282'.
> The individual assigned to look at your
> report is: freebsd-amd64.
>
> You can access the state of your problem report at any time
> via this link:
>
> http://www.freebsd.org/cgi/query-pr.cgi?pr=179282
>
>>Category:   amd64
>>Responsible:freebsd-amd64
>>Synopsis:   [PATCH] Intel SMAP for FreeBSD-CURRENT
>>Arrival-Date:   Mon Jun 03 23:10:01 UTC 2013
>
___
freebsd-amd64@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-amd64
To unsubscribe, send any mail to "freebsd-amd64-unsubscr...@freebsd.org"


Re: amd64/179282: [PATCH] Intel SMAP for FreeBSD-CURRENT

2014-05-05 Thread Oliver Pinter
The following reply was made to PR amd64/179282; it has been noted by GNATS.

From: Oliver Pinter 
To: freebsd-gnats-sub...@freebsd.org, freebsd-amd64@freebsd.org
Cc:  
Subject: Re: amd64/179282: [PATCH] Intel SMAP for FreeBSD-CURRENT
Date: Mon, 5 May 2014 13:11:10 +0200

 I'm working on this, as part of FreeBSD GSoC2014.
 
 On 6/4/13, freebsd-gnats-sub...@freebsd.org
  wrote:
 > Thank you very much for your problem report.
 > It has the internal identification `amd64/179282'.
 > The individual assigned to look at your
 > report is: freebsd-amd64.
 >
 > You can access the state of your problem report at any time
 > via this link:
 >
 > http://www.freebsd.org/cgi/query-pr.cgi?pr=179282
 >
 >>Category:   amd64
 >>Responsible:freebsd-amd64
 >>Synopsis:   [PATCH] Intel SMAP for FreeBSD-CURRENT
 >>Arrival-Date:   Mon Jun 03 23:10:01 UTC 2013
 >
___
freebsd-amd64@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-amd64
To unsubscribe, send any mail to "freebsd-amd64-unsubscr...@freebsd.org"


Re: svn commit: r309400 - head/sys/dev/acpica

2016-12-03 Thread Oliver Pinter
On Sat, Dec 3, 2016 at 9:58 PM, Oliver Pinter
 wrote:
> On 12/3/16, Oliver Pinter  wrote:
>> On 12/3/16, Oliver Pinter  wrote:
>>> On Fri, Dec 2, 2016 at 9:21 AM, Hans Petter Selasky
>>>  wrote:
>>>> Author: hselasky
>>>> Date: Fri Dec  2 08:21:08 2016
>>>> New Revision: 309400
>>>> URL: https://svnweb.freebsd.org/changeset/base/309400
>>>>
>>>> Log:
>>>>   Fix for endless recursion in the ACPI GPE handler during boot.
>>>>
>>>>   When handling a GPE ACPI interrupt object the EcSpaceHandler()
>>>>   function can be called which checks the EC_EVENT_SCI bit and then
>>>>   recurse on the EcGpeQueryHandler() function. If there are multiple GPE
>>>>   events pending the EC_EVENT_SCI bit will be set at the next call to
>>>>   EcSpaceHandler() causing it to recurse again via the
>>>>   EcGpeQueryHandler() function. This leads to a slow never ending
>>>>   recursion during boot which prevents proper system startup, because
>>>>   the EC_EVENT_SCI bit never gets cleared in this scenario.
>>>>
>>>>   The behaviour is reproducible with the ALASKA AMI in combination with
>>>>   a newer Skylake based mainboard in the following way:
>>>>
>>>>   Enter BIOS and adjust the clock one hour forward. Save and exit the
>>>>   BIOS. System fails to boot due to the above mentioned bug in
>>>>   EcGpeQueryHandler() which was observed recursing multiple times.
>>>>
>>>>   This patch adds a simple recursion guard to the EcGpeQueryHandler()
>>>>   function and also also adds logic to detect if new GPE events occurred
>>>>   during the execution of EcGpeQueryHandler() and then loop on this
>>>>   function instead of recursing.
>>>>
>>>>   Reviewed by:  jhb
>>>>   MFC after:2 weeks
>>>>
>>>> Modified:
>>>>   head/sys/dev/acpica/acpi_ec.c
>>>
>>>
>>> I have similar error since the latest BIOS update on my gigabyte
>>> H170N-Wifi board. The curiosity of the BIOS update was after upgrading
>>> to this version, there are no possibility to rollback to older
>>> version.
>>>
>>> The other weird thing, is that MFCing back this patch does not help. I
>>> get stucked lock in acmtx mutex, as you
>>> could see from the attached log. The other interesting is the ACPI
>>> error at boot time:
>>>
>>> [1] ACPI Error: Mutex [0x0] is not acquired, cannot release
>>> (20160527/utmutex-386)
>>> [1] ACPI Error: Could not release AML Interpreter mutex
>>> (20160527/exutils-147)
>>> [1] ACPI Error: Mutex [0x0] is not acquired, cannot release
>>> (20160527/utmutex-386)
>>> [1] ACPI Error: Could not release AML Interpreter mutex
>>> (20160527/exutils-147)
>>> [1] cpu1:  on acpi0
>>> [1] ACPI Error: Mutex [0x0] is not acquired, cannot release
>>> (20160527/utmutex-386)
>>> [1] ACPI Error: Could not release AML Interpreter mutex
>>> (20160527/exutils-147)
>>> [1] ACPI Error: Mutex [0x0] is not acquired, cannot release
>>> (20160527/utmutex-386)
>>> [1] ACPI Error: Could not release AML Interpreter mutex
>>> (20160527/exutils-147)
>>>
>>> (This error is on 10-STABLE.)
>>>
>>
>> After backported the last to ACPICA update to 10-STABLE with this
>> patch, the issue reducated to this warning message:
>
> Attached the two backport.
>
>>
>>  [1] acpi0: Power Button (fixed)
>> [1] ACPI Error: Method parse/execution failed [\134_SB.PCI0.IOTR._CRS]
>> (Node 0xf80006592f00), AE_AML_NO_RESOURCE_END_TAG
>> (20161117/psparse-560)
>> [1] ACPI Error: Method execution failed [\134_SB.PCI0.IOTR._CRS] (Node
>> 0xf80006592f00), AE_AML_NO_RESOURCE_END_TAG (20161117/uteval-111)
>> [1] can't fetch resources for \134_SB_.PCI0.IOTR -
>> AE_AML_NO_RESOURCE_END_TAG
>>
>> but the lockup has gone. ;)
>>

CC: ACPI and AMD64

>>
>> [trim]
>>


0001-HBSD-MFC-pull-in-ACPICA-20160930-from-FreeBSD-12-CUR.patch.xz
Description: Binary data


0002-HBSD-MFC-Merge-ACPICA-20161117.patch.xz
Description: Binary data
___
freebsd-amd64@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-amd64
To unsubscribe, send any mail to "freebsd-amd64-unsubscr...@freebsd.org"

Re: svn commit: r309400 - head/sys/dev/acpica

2016-12-06 Thread Oliver Pinter
On Tue, Dec 6, 2016 at 11:01 PM, Moore, Robert  wrote:
>
>
>> -Original Message-
>> From: owner-freebsd-a...@freebsd.org [mailto:owner-freebsd-
>> a...@freebsd.org] On Behalf Of Oliver Pinter
>> Sent: Saturday, December 3, 2016 1:11 PM
>> To: Hans Petter Selasky ; j...@freebsd.org
>> Cc: freebsd-a...@freebsd.org; freebsd-amd64@freebsd.org
>> Subject: Re: svn commit: r309400 - head/sys/dev/acpica
>>
>> On Sat, Dec 3, 2016 at 9:58 PM, Oliver Pinter
>>  wrote:
>> > On 12/3/16, Oliver Pinter  wrote:
>> >> On 12/3/16, Oliver Pinter  wrote:
>> >>> On Fri, Dec 2, 2016 at 9:21 AM, Hans Petter Selasky
>> >>>  wrote:
>> >>>> Author: hselasky
>> >>>> Date: Fri Dec  2 08:21:08 2016
>> >>>> New Revision: 309400
>> >>>> URL: https://svnweb.freebsd.org/changeset/base/309400
>> >>>>
>> >>>> Log:
>> >>>>   Fix for endless recursion in the ACPI GPE handler during boot.
>> >>>>
>> >>>>   When handling a GPE ACPI interrupt object the EcSpaceHandler()
>> >>>>   function can be called which checks the EC_EVENT_SCI bit and then
>> >>>>   recurse on the EcGpeQueryHandler() function. If there are
>> multiple GPE
>> >>>>   events pending the EC_EVENT_SCI bit will be set at the next call
>> to
>> >>>>   EcSpaceHandler() causing it to recurse again via the
>> >>>>   EcGpeQueryHandler() function. This leads to a slow never ending
>> >>>>   recursion during boot which prevents proper system startup,
>> because
>> >>>>   the EC_EVENT_SCI bit never gets cleared in this scenario.
>> >>>>
>> >>>>   The behaviour is reproducible with the ALASKA AMI in combination
>> with
>> >>>>   a newer Skylake based mainboard in the following way:
>> >>>>
>> >>>>   Enter BIOS and adjust the clock one hour forward. Save and exit
>> the
>> >>>>   BIOS. System fails to boot due to the above mentioned bug in
>> >>>>   EcGpeQueryHandler() which was observed recursing multiple times.
>> >>>>
>> >>>>   This patch adds a simple recursion guard to the
>> EcGpeQueryHandler()
>> >>>>   function and also also adds logic to detect if new GPE events
>> occurred
>> >>>>   during the execution of EcGpeQueryHandler() and then loop on this
>> >>>>   function instead of recursing.
>> >>>>
>> >>>>   Reviewed by:  jhb
>> >>>>   MFC after:2 weeks
>> >>>>
>> >>>> Modified:
>> >>>>   head/sys/dev/acpica/acpi_ec.c
>> >>>
>> >>>
>> >>> I have similar error since the latest BIOS update on my gigabyte
>> >>> H170N-Wifi board. The curiosity of the BIOS update was after
>> >>> upgrading to this version, there are no possibility to rollback to
>> >>> older version.
>> >>>
>> >>> The other weird thing, is that MFCing back this patch does not help.
>> >>> I get stucked lock in acmtx mutex, as you could see from the
>> >>> attached log. The other interesting is the ACPI error at boot time:
>> >>>
>> >>> [1] ACPI Error: Mutex [0x0] is not acquired, cannot release
>> >>> (20160527/utmutex-386)
>> >>> [1] ACPI Error: Could not release AML Interpreter mutex
>> >>> (20160527/exutils-147)
>> >>> [1] ACPI Error: Mutex [0x0] is not acquired, cannot release
>> >>> (20160527/utmutex-386)
>> >>> [1] ACPI Error: Could not release AML Interpreter mutex
>> >>> (20160527/exutils-147)
>> >>> [1] cpu1:  on acpi0
>> >>> [1] ACPI Error: Mutex [0x0] is not acquired, cannot release
>> >>> (20160527/utmutex-386)
>> >>> [1] ACPI Error: Could not release AML Interpreter mutex
>> >>> (20160527/exutils-147)
>> >>> [1] ACPI Error: Mutex [0x0] is not acquired, cannot release
>> >>> (20160527/utmutex-386)
>> >>> [1] ACPI Error: Could not release AML Interpreter mutex
>> >>> (20160527/exutils-147)
>> >>>
>> >>> (This error is on 10-STABLE.)
>> >>>
>> >>
>> >> After backported the last to ACPICA update to 10-STABLE with this
>> >> patch, the