lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 23 Feb 2009 22:48:30 -0800
From:	Andy Isaacson <adi@...apodia.org>
To:	Yinghai Lu <yinghai@...nel.org>
Cc:	Maciej Rutecki <maciej.rutecki@...il.com>,
	"Rafael J. Wysocki" <rjw@...k.pl>, Eric Anholt <eric@...olt.net>,
	Linus Torvalds <torvalds@...ux-foundation.org>,
	Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
	Jesse Barnes <jbarnes@...tuousgeek.org>,
	"lenb@...nel.org" <lenb@...nel.org>, Ingo Molnar <mingo@...e.hu>,
	mjg@...hat.com, Andrew Morton <akpm@...ux-foundation.org>,
	rui.zhang@...el.com, airlied@...hat.com
Subject: Re: [Linux 2.6.29-rc6] [drm:i915_set_status_page] *ERROR* can not ioremap virtual address for G33 hw status page

On Mon, Feb 23, 2009 at 09:50:03PM -0800, Yinghai Lu wrote:
> > reg 0, base: 0GB, range: 32GB, type WB
> > reg 1, base: 3584MB, range: 512MB, type UC
> > reg 2, base: 2012MB, range: 4MB, type UC
> > reg 3, base: 2016MB, range: 32MB, type UC
> 
> the BIOS is so sick
> according to MTRR, it said:
> [0,2012M) is WB
> [2048M, 3.5G) is WB too
> [4G, 32G) is WB
> 
> but according to e820: about [0,2g) is RAM...
> 
> really not how to workaround in BIOS.
> 
> please check if you have some new BIOS?

That was with bios A11.  There is an A12 available on dell.com, I'll try
installing it tomorrow...

-andy
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ