lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <46A8BB6C.6050903@zytor.com>
Date:	Thu, 26 Jul 2007 08:19:08 -0700
From:	"H. Peter Anvin" <hpa@...or.com>
To:	Xudong Guan <xudong.guan@...il.com>
CC:	Borislav Petkov <bbpetkov@...oo.de>, linux-kernel@...r.kernel.org
Subject: Re: 2.6.23-rc1: no setup signature found...

Xudong Guan wrote:
> On 13:26(+0200) Tue 24 Jul, Borislav Petkov wrote:
>>    2.6.23-rc1 won't boot on my Asus M6N laptop and the last thing it shows after loading
>> grub is "No setup signature found...," which, imho, comes from
>> arch/i386/boot/header.S. I tried printing out the value of setup_sig like so
> 
> I hitted the same error message with v2.6.23-rc1-171-ge4903fb.
> No problem with v2.6.21-3770-g01e73be.
> Seems there has been some cleanup of the i386/boot code.
> Anyone can give a quick clue, or should I do a bisect?

The bisect will almost guaranteed show a change at the change to the new
setup code.  The message means that the setup code wasn't loaded
correctly into memory; the big question is *why*.

What distro/version of grub are you running?  I'm wondering if there are
some old version of grub out there which did the "load four sectors"
way-anciently-obsolete crap; the other possibility that comes to mind is
setting up the stack in an invalid manner.

	-hpa
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ