lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <86802c440907091412n3157775ft4c025aab595923ad@mail.gmail.com>
Date:	Thu, 9 Jul 2009 14:12:36 -0700
From:	Yinghai Lu <yhlu.kernel@...il.com>
To:	James Bottomley <James.Bottomley@...senpartnership.com>
Cc:	dann frazier <dannf@...com>, linux-scsi@...r.kernel.org,
	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
Subject: Re: mptsas, msi and the dl585 g2

On Thu, Jul 9, 2009 at 1:40 PM, James
Bottomley<James.Bottomley@...senpartnership.com> wrote:
> On Thu, 2009-07-09 at 12:48 -0700, Yinghai Lu wrote:
>> [    4.333140]   PREFETCH window: 0x00000000d9f00000-0x00000000d9ffffff
>> are all directed to one 8132 PCI-X bridge.
>>
>> the the IOAPIC for 9, 10, 11... falling that range...
>>
>> we need one better to allocate range for that pci-x bridge to aovide ioapic BAR allocated...
>>
>> anyway your BIOS sucks.
>
> It's a sad and very annoying fact of life that most BIOSs suck.  If they
> didn't suck, our bios handling code wouldn't be a nasty mess of
> exceptions, work arounds and quirks.
>
> Can we fix this so that both the DL585 and the opteron multi root stuff
> can work?  There's a large population of DL585's out there, so we can't
> release 2.6.32 like this ... and I'd rather not have to choose between
> breaking the DL585's and breaking the Sun Opterons.

sure. will send out one patch after get some sanity test here.

YH
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ