lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <464ECFD5.6090005@xs4all.nl>
Date:	Sat, 19 May 2007 12:22:13 +0200
From:	Hans de Bruin <bruinjm@...all.nl>
To:	linux-kernel@...r.kernel.org
Subject: Re: 2.6.22-rc1 does not boot on VIA C3_2 cause of X86_CMPXCHG64

Christian Volkmann wrote:
> Christian wrote:
> Hmm, I really think so...:
>> May I brought up a wrong reason with the command cmpxchg64.
>> But disabling CONFIG_X86_CMPXCHG64 helps.
>>
> 
> 
> Hi,
> 
> 
> I found some time to investigate. My resume is:
> 
> - kernel/verify_cpu.S causes the stop at boot time
>   Cause the required flag for CMPXCHG8B is not set.
> 
> - boot/setup.S did not print "PANIC: CPU too old for this kernel"
>   ( not visible, also the message did not match )
> 
> - VIA C3_2: CMPXCHG8B should work always. Via C3 EBGA Datasheet R1.90 page 30 (3-4)
>   But the bit is not set cause of some early Win NT bugs.
> 
> - X86_CMPXCHG64 can be set and used. Just verify_cpu.S requires a change
>   to ignore the missing indicator at boot time.
> 
> 
> 
> My suggestion for the fix is:
> 
> - kernel/verify_cpu.S should be more tolerant if CONFIG_MVIAC3_2 is set
>   ( see patch below )
> 
> - boot/setup.S should be fixed to print out a proper error message
>   ( see below )
> 
> - X86_CMPXCHG64 patch(earlier mail in thread ) should not be used.
> 
> 
> - Important: somebody to check other CPU types if the same behavior happens.

I applied the patch on rc2, changed 'if CONFIG_MVIAC3_2' in if 
CONFIG_MVIAC7' and build a working VIA C7 kernel.

-- 
Hans
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ