lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20071025041454.GB25376@linux-sh.org> Date: Thu, 25 Oct 2007 13:14:54 +0900 From: Paul Mundt <lethal@...ux-sh.org> To: Andrew Morton <akpm@...ux-foundation.org> Cc: Bernhard Walle <bwalle@...e.de>, kexec@...ts.infradead.org, linux-kernel@...r.kernel.org, linuxsh-dev@...ts.sourceforge.net Subject: Re: [patch 2/2] Use BOOTMEM_EXCLUSIVE for kdump On Wed, Oct 24, 2007 at 09:05:33PM -0700, Andrew Morton wrote: > On Wed, 24 Oct 2007 18:37:35 +0200 Bernhard Walle <bwalle@...e.de> wrote: > > This patch uses the BOOTMEM_EXCLUSIVE, introduced in the previous patch, > > to avoid conflicts while reserving the memory for the kdump carpture kernel > > (crashkernel=). > > > > Signed-off-by: Bernhard Walle <bwalle@...e.de> > > > > --- > > arch/sh/kernel/setup.c | 29 ++++++++++++++++++----------- > > arch/x86/kernel/setup_32.c | 28 ++++++++++++++++++---------- > > arch/x86/kernel/setup_64.c | 35 +++++++++++++++++++++-------------- > > ia64 and powerpc support crash dump too? > Not via a reserved bootmem area at least, which is what these patches touch. Acked-by: Paul Mundt <lethal@...ux-sh.org> - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists