lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Thu, 5 Oct 2006 21:42:29 +0200
From:	Andi Kleen <ak@...e.de>
To:	discuss@...-64.org
Cc:	Jeff Garzik <jeff@...zik.org>, torvalds@...l.org,
	linux-kernel@...r.kernel.org
Subject: Re: [discuss] Re: Please pull x86-64 bug fixes

tel 975 board and a Asus AMD K8 board with PCI Express) please share it.
> 
> Can you then please share the list of known BIOS bugs?

I already did, but here again in detail:

Intel 9x5 hangs when you do any mmconfig access (apparently reference BIOS
fills in bogus address). Check against ACPI resources doesn't catch it
either.

Mac Mini doesn't do any Type1 at all, so a verify pass that checks
mcfg against type1 doesn't work there.

AMD K8 boards with PCI-E bridges have mmconfig only 
on some busses, but not on the internal northbridge busses. 
MCFG can describe this by listing segments, but the contents 
of that on many boards can be described as "fictional" at best.
That is why Linux needs to verify that too.
 
> All I have to do on my machines is work around the disable-mmconfig 
> code, and things start working.

If the choice is between a secret NDA only card with dubious
functionality and booting on lots of modern boards I know what to 
choose.

-Andi
 
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ