On Fri, Jun 29, 2012 at 05:30:01PM +0100, Steve Graham wrote: > >Is that a standard (non-realtime) kernel? If not, can you also test a > >standard kernel configuration (linux-image-3.2.0-3-amd64)? > > Identical behaviour on linux-image-3.2.0-3-amd64 > > >Please try booting with the extra kernel parameters: > > > > memory_corruption_check=1 memory_corruption_check_size=640K > > memory_corruption_check_period=5 > > > >Does that avoid the problem, and if so what does the kernel log show > >after you plug in the device? > > It seems that X86_CHECK_BIOS_CORRUPTION is disabled in the Debian > kernels. I'm compiling a custom one with it enabled and will post > any significant results. Oops, sorry, I thought we had it enabled.
Ben. -- Ben Hutchings We get into the habit of living before acquiring the habit of thinking. - Albert Camus -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20120629163930.ga1...@decadent.org.uk