lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20080107224757.GA2336@basil.nowhere.org>
Date:	Mon, 7 Jan 2008 23:47:57 +0100
From:	Andi Kleen <andi@...stfloor.org>
To:	Robert Hancock <hancockr@...w.ca>
Cc:	mingo@...e.hu, tglx@...utronix.de, linux-kernel@...r.kernel.org,
	akpm@...l.org, jbarnes@...tuousgeek.org, rajesh.shah@...el.com,
	greg@...ah.com
Subject: MCFG ACPI patch in git-x86 causes boot regression


This patch

commit c5182babd1d0706f1294af7b8dbf64e378b066bb
Author: Robert Hancock <hancockr@...w.ca>
Date:   Sat Jan 5 13:26:32 2008 +0100

    x86: validate against ACPI motherboard resources
    
...

recently added to git-x86 causes one of my Intel test systems to not boot 
unless I specify pci=conf1.

...
ACPI: EC: Look up EC in DSDT
ACPI: Interpreter enabled
ACPI: (supports S0 S3 S4 S5)
ACPI: Using IOAPIC for interrupt routing
PCI: MCFG configuration 0: base 4026531840 segment 0 buses 0 - 127
PCI: MCFG area at f0000000 reserved in ACPI motherboard resources
PCI: Using MMCONFIG at f0000000 - f7ffffff
ACPI: PCI Root Bridge [PCI0] (0000:00)
<hang> 

The system is a SDV, but I believe production level.
DSDT is available at http://firstfloor.org/~andi/dsdt.dsl

On previous kernels the MCFG was rejected because it wasn't e820 reserved:

ACPI: bus type pci registered
PCI: BIOS Bug: MCFG area at f0000000 is not E820-reserved
PCI: Not using MMCONFIG.
PCI: Using configuration type 1

Also I'm a little surprised to find my Signed-off-by on that patch.

-Andi


--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ