lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <1384215407-22288-1-git-send-email-hpa@linux.intel.com>
Date:	Mon, 11 Nov 2013 16:16:44 -0800
From:	"H. Peter Anvin" <hpa@...ux.intel.com>
To:	Ingo Molnar <mingo@...nel.org>,
	Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
	Thomas Gleixner <tglx@...utronix.de>
Cc:	Olof Johansson <olof@...om.net>,
	"H. Peter Anvin" <hpa@...ux.intel.com>
Subject: [RFC PATCH 0/3] x86, boot: Low memory reservation fixes

From: "H. Peter Anvin" <hpa@...ux.intel.com>

On all but the tiniest of modern systems, losing half a megabyte of
RAM is a small price to pay for system stability.  Thus, switch the
default for low memory reservation to 640K.  This has been possible,
but has not been the default, since v3.9, specifically checkin:

  95c9608478d6 x86, mm: Move reserving low memory later in initialization

The above checkin exposes a problem with our reservation ordering;
specifically setup_bios_corruption_check() is called too early, so fix
that.  This caused the BIOS corruption check to run on memory that
would have been reserved anyway.

Finally, change the low memory check scanner to scan 640K rather than
64K by default.  The low memory check scanner will be a noop in the
common case, as it now will only grab memory that is not otherwise
reserved; this makes it purely a diagnostic tool.

H. Peter Anvin (3):
      x86, boot: Move setup_bios_corruption_check() later
      x86, boot: Change the default for X86_RESERVE_LOW to 640K, make EXPERT
      x86, boot: Change the BIOS corruption checker to scan 640K
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ