lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20090709091141.19652887@feng-desktop>
Date:	Thu, 9 Jul 2009 09:11:41 +0800
From:	Feng Tang <feng.tang@...el.com>
To:	"H. Peter Anvin" <hpa@...or.com>
CC:	Len Brown <lenb@...nel.org>, "x86@...nel.org" <x86@...nel.org>,
	"sfi-devel@...plefirmware.org" <sfi-devel@...plefirmware.org>,
	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
	"linux-acpi@...r.kernel.org" <linux-acpi@...r.kernel.org>,
	"Brown, Len" <len.brown@...el.com>
Subject: Re: [PATCH 08/12] SFI, x86: hook e820() for memory map
 initialization

On Thu, 9 Jul 2009 05:37:08 +0800
"H. Peter Anvin" <hpa@...or.com> wrote:

> This bothers me... we keep saying that memory map initialization
> belongs to the boot loader, and yet we keep doing the opposite.  This
> isn't just an arbitrary difference, either: it is pretty essential to
> being able to use the early range allocator safely.
> 
> 	-hpa

Hi hpa,

I understand your concern, and I've added that code into our boot loader
for Moosrestown which sets up a e820 memory table in boot parameters by 
parsing SFI table. 

The reason we still keep this piece of code is to be compatible with old
version boot loaders which may not know SFI info yet. And
sfi_init_memory_map() only get called when kernel can't find an e820 table
in boot parameters.

Anyway, I think we can remove the code if it really breaks the rule.

Thanks,
Feng

> 
> 
> Len Brown wrote:
> > From: Feng Tang <feng.tang@...el.com>
> > 
> > Signed-off-by: Feng Tang <feng.tang@...el.com>
> > Signed-off-by: Len Brown <len.brown@...el.com>
> > ---
> >  arch/x86/kernel/e820.c |    5 +++++
> >  1 files changed, 5 insertions(+), 0 deletions(-)
> > 
> > diff --git a/arch/x86/kernel/e820.c b/arch/x86/kernel/e820.c
> > index c4ca89d..e399d0e 100644
> > --- a/arch/x86/kernel/e820.c
> > +++ b/arch/x86/kernel/e820.c
> > @@ -20,6 +20,7 @@
> >  #include <linux/pfn.h>
> >  #include <linux/suspend.h>
> >  #include <linux/firmware-map.h>
> > +#include <linux/sfi.h>
> >  
> >  #include <asm/pgtable.h>
> >  #include <asm/page.h>
> > @@ -1437,6 +1438,10 @@ char *__init
> > default_machine_specific_memory_setup(void) < 0) {
> >  		u64 mem_size;
> >  
> > +		/* if SFI mmap table exists, use SFI to setup e820
> > mmap */
> > +		if (!sfi_init_memory_map())
> > +			return "SFI";
> > +
> >  		/* compare results from other methods and take the
> > greater */ if (boot_params.alt_mem_k
> >  		    < boot_params.screen_info.ext_mem_k) {
> 
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ