[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <24e43280-1442-3c4e-aa57-ac84b987aa58@redhat.com>
Date: Thu, 25 Feb 2021 18:23:24 +0100
From: David Hildenbrand <david@...hat.com>
To: George Kennedy <george.kennedy@...cle.com>,
Mike Rapoport <rppt@...ux.ibm.com>
Cc: Andrey Konovalov <andreyknvl@...gle.com>,
Andrew Morton <akpm@...ux-foundation.org>,
Catalin Marinas <catalin.marinas@....com>,
Vincenzo Frascino <vincenzo.frascino@....com>,
Dmitry Vyukov <dvyukov@...gle.com>,
Konrad Rzeszutek Wilk <konrad@...nok.org>,
Will Deacon <will.deacon@....com>,
Andrey Ryabinin <aryabinin@...tuozzo.com>,
Alexander Potapenko <glider@...gle.com>,
Marco Elver <elver@...gle.com>,
Peter Collingbourne <pcc@...gle.com>,
Evgenii Stepanov <eugenis@...gle.com>,
Branislav Rankov <Branislav.Rankov@....com>,
Kevin Brodsky <kevin.brodsky@....com>,
Christoph Hellwig <hch@...radead.org>,
kasan-dev <kasan-dev@...glegroups.com>,
Linux ARM <linux-arm-kernel@...ts.infradead.org>,
Linux Memory Management List <linux-mm@...ck.org>,
LKML <linux-kernel@...r.kernel.org>,
Dhaval Giani <dhaval.giani@...cle.com>
Subject: Re: [PATCH] mm, kasan: don't poison boot memory
On 25.02.21 17:31, George Kennedy wrote:
> : rsdp_address=bfbfa014
> [ 0.066612] ACPI: RSDP 0x00000000BFBFA014 000024 (v02 BOCHS )
> [ 0.067759] ACPI: XSDT 0x00000000BFBF90E8 00004C (v01 BOCHS BXPCFACP
> 00000001 01000013)
> [ 0.069470] ACPI: FACP 0x00000000BFBF5000 000074 (v01 BOCHS BXPCFACP
> 00000001 BXPC 00000001)
> [ 0.071183] ACPI: DSDT 0x00000000BFBF6000 00238D (v01 BOCHS BXPCDSDT
> 00000001 BXPC 00000001)
> [ 0.072876] ACPI: FACS 0x00000000BFBFD000 000040
> [ 0.073806] ACPI: APIC 0x00000000BFBF4000 000090 (v01 BOCHS BXPCAPIC
> 00000001 BXPC 00000001)
> [ 0.075501] ACPI: HPET 0x00000000BFBF3000 000038 (v01 BOCHS BXPCHPET
> 00000001 BXPC 00000001)
> [ 0.077194] ACPI: BGRT 0x00000000BE49B000 000038 (v01 INTEL EDK2
> 00000002 01000013)
> [ 0.078880] ACPI: iBFT 0x00000000BE453000 000800 (v01 BOCHS BXPCFACP
> 00000000 00000000)
Can you explore the relevant area using the page-flags tools (located in
Linux src code located in tools/vm/page-flags.c)
./page-types -L -r -a 0xbe490,0xbe4a0
--
Thanks,
David / dhildenb
Powered by blists - more mailing lists