lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Mon, 25 Aug 2014 12:16:53 +0100
From:	Matt Fleming <matt@...sole-pimps.org>
To:	Dave Young <dyoung@...hat.com>
Cc:	"Zheng, Lv" <lv.zheng@...el.com>,
	"Fleming, Matt" <matt.fleming@...el.com>,
	"linux-efi@...r.kernel.org" <linux-efi@...r.kernel.org>,
	"linux-acpi@...r.kernel.org" <linux-acpi@...r.kernel.org>,
	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
	"devel@...ica.org" <devel@...ica.org>,
	"lenb@...nel.org" <lenb@...nel.org>,
	"Wysocki, Rafael J" <rafael.j.wysocki@...el.com>,
	"Moore, Robert" <robert.moore@...el.com>
Subject: Re: kernel boot fail with efi earlyprintk (bisected)

On Mon, 25 Aug, at 05:06:19PM, Dave Young wrote:
> 
> Problem is I do not understand the implementation detail yet.
> 
> I did below changes:
> 
> Original values:
> #define NR_FIX_BTMAPS           64
> #define FIX_BTMAPS_SLOTS        4
> 
> -> new values tested:
> #define NR_FIX_BTMAPS           32
> #define FIX_BTMAPS_SLOTS        8
> 
> 
> There's below comments
>         /*
>          * 256 temporary boot-time mappings, used by early_ioremap(),
>          * before ioremap() is functional.
>          *
>          * If necessary we round it up to the next 256 pages boundary so
>          * that we can have a single pgd entry and a single pte table:
>          */
> 
> So seems increase it to 64 * 8 = 512 should be ok. If it's fine I can test again
> and post a patch.

Make sure you include the x86 maintainers on Cc if you change these
values.

-- 
Matt Fleming, Intel Open Source Technology Center
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ