Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1757434AbYH2RYg (ORCPT ); Fri, 29 Aug 2008 13:24:36 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1751960AbYH2RY1 (ORCPT ); Fri, 29 Aug 2008 13:24:27 -0400 Received: from terminus.zytor.com ([198.137.202.10]:42489 "EHLO terminus.zytor.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751024AbYH2RY0 (ORCPT ); Fri, 29 Aug 2008 13:24:26 -0400 Message-ID: <48B82FF4.3050000@zytor.com> Date: Fri, 29 Aug 2008 10:20:52 -0700 From: "H. Peter Anvin" User-Agent: Thunderbird 2.0.0.14 (X11/20080501) MIME-Version: 1.0 To: Jeremy Fitzhardinge CC: Hugh Dickins , Ingo Molnar , =?UTF-8?B?UmFmYcWCIE1pxYJlY2tp?= , Alan Jenkins , Linux Kernel Mailing List Subject: Re: [PATCH RFC] x86: check for and defend against BIOS memory corruption References: <48B701FB.2020905@goop.org> <48B80C26.2080002@goop.org> In-Reply-To: <48B80C26.2080002@goop.org> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 497 Lines: 15 Jeremy Fitzhardinge wrote: > > It would be easy to add another kernel parameter to select how much > memory to reserve for corruption checking. 64k? 1M? > Or just make the boot_corruption_check parameter take a range instead of a boolean. -hpa -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/