lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20160324094441.GA8893@krava.brq.redhat.com>
Date:	Thu, 24 Mar 2016 10:44:41 +0100
From:	Jiri Olsa <jolsa@...hat.com>
To:	Stephane Eranian <eranian@...gle.com>
Cc:	Peter Zijlstra <peterz@...radead.org>,
	Andi Kleen <ak@...ux.intel.com>,
	LKML <linux-kernel@...r.kernel.org>,
	Arnaldo Carvalho de Melo <acme@...hat.com>,
	"mingo@...e.hu" <mingo@...e.hu>, Borislav Petkov <bp@...e.de>,
	Bjorn Helgaas <bhelgaas@...gle.com>,
	Zhang Rui <rui.zhang@...el.com>,
	"Rafael J. Wysocki" <rjw@...ysocki.net>
Subject: [bug] mapping multiple BARs

hi,
I'm hitting following lines in dmesg:
  resource sanity check: requesting [mem 0xfed10000-0xfed15fff], which spans more than reserved [mem 0xfed10000-0xfed13fff]
  caller snb_uncore_imc_init_box+0x7c/0xa0 mapping multiple BARs

I'm on IvyBridge model 58
  vendor_id       : GenuineIntel
  cpu family      : 6
  model           : 58
  model name      : Intel(R) Core(TM) i7-3720QM CPU @ 2.60GHz
  stepping        : 9
  microcode       : 0x1c

I've read following threads:
  http://marc.info/?w=2&r=1&s=mapping+multiple+BARs&q=t

and it seems this is supposed to be already fixed by:
  cb171f7abb9a PNP: Work around BIOS defects in Intel MCH area reporting

however I see it on latest tip tree:
  ee16c66 Merge branch 'x86/urgent'

dmesg and config are attached, please let me know
in case you need more data

thanks,
jirka

View attachment "dmesg" of type "text/plain" (41048 bytes)

View attachment "config" of type "text/plain" (139959 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ