[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <1384215407-22288-4-git-send-email-hpa@linux.intel.com>
Date: Mon, 11 Nov 2013 16:16:47 -0800
From: "H. Peter Anvin" <hpa@...ux.intel.com>
To: Ingo Molnar <mingo@...nel.org>,
Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
Thomas Gleixner <tglx@...utronix.de>
Cc: Olof Johansson <olof@...om.net>,
"H. Peter Anvin" <hpa@...ux.intel.com>
Subject: [RFC PATCH 3/3] x86, boot: Change the BIOS corruption checker to scan 640K
From: "H. Peter Anvin" <hpa@...ux.intel.com>
Change the BIOS corruption checker to scan 640K if enabled. This is
the normal amount that we otherwise would reserve with the new default
settings; change the Kconfig help message to indicate that this is now
intended as a diagnostic tool when one is considering enabling any
chunk of low memory.
Signed-off-by: H. Peter Anvin <hpa@...ux.intel.com>
Cc: Olof Johansson <olof@...om.net>
Link: http://lkml.kernel.org/r/528168CB.7070602@linux.intel.com
---
arch/x86/Kconfig | 25 +++++++++++--------------
arch/x86/kernel/check.c | 10 +++++-----
2 files changed, 16 insertions(+), 19 deletions(-)
diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig
index 7631122..554aedd 100644
--- a/arch/x86/Kconfig
+++ b/arch/x86/Kconfig
@@ -1384,24 +1384,21 @@ config HIGHPTE
config X86_CHECK_BIOS_CORRUPTION
bool "Check for low memory corruption"
---help---
- Periodically check for memory corruption in low memory, which
- is suspected to be caused by BIOS. Even when enabled in the
- configuration, it is disabled at runtime. Enable it by
- setting "memory_corruption_check=1" on the kernel command
- line. By default it scans the low 64k of memory every 60
- seconds; see the memory_corruption_check_size and
+ Periodically check for memory corruption in low memory,
+ which is suspected to be caused by BIOS. Even when enabled
+ in the configuration, it is disabled at runtime. Enable it
+ by setting "memory_corruption_check=1" on the kernel command
+ line. By default it reserves and scans the low 640K of
+ memory every 60 seconds; see the
+ memory_corruption_check_size and
memory_corruption_check_period parameters in
Documentation/kernel-parameters.txt to adjust this.
- When enabled with the default parameters, this option has
- almost no overhead, as it reserves a relatively small amount
- of memory and scans it infrequently. It both detects corruption
- and prevents it from affecting the running system.
-
- It is, however, intended as a diagnostic tool; if repeatable
+ It is intended as a diagnostic tool; if repeatable
BIOS-originated corruption always affects the same memory,
- you can use memmap= to prevent the kernel from using that
- memory.
+ you should use the memmap= or reservelow= runtime options or
+ the CONFIG_X86_RESERVE_LOW compile time option to prevent
+ the kernel from using that memory.
config X86_BOOTPARAM_MEMORY_CORRUPTION_CHECK
bool "Set the default setting of memory_corruption_check"
diff --git a/arch/x86/kernel/check.c b/arch/x86/kernel/check.c
index e2dbcb7..c00182d 100644
--- a/arch/x86/kernel/check.c
+++ b/arch/x86/kernel/check.c
@@ -7,16 +7,16 @@
#include <asm/proto.h>
/*
- * Some BIOSes seem to corrupt the low 64k of memory during events
- * like suspend/resume and unplugging an HDMI cable. Reserve all
- * remaining free memory in that area and fill it with a distinct
- * pattern.
+ * Some BIOSes and even some hardware devices seem to corrupt the low
+ * 640K of memory during events like suspend/resume and unplugging an
+ * HDMI cable. Reserve all remaining free memory in that area and
+ * fill it with a distinct pattern.
*/
#define MAX_SCAN_AREAS 8
static int __read_mostly memory_corruption_check = -1;
-static unsigned __read_mostly corruption_check_size = 64*1024;
+static unsigned __read_mostly corruption_check_size = 640*1024;
static unsigned __read_mostly corruption_check_period = 60; /* seconds */
static struct scan_area {
--
1.8.3.1
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists