diff options
author | H. Peter Anvin <hpa@zytor.com> | 2008-02-13 11:16:46 -0800 |
---|---|---|
committer | Ingo Molnar <mingo@elte.hu> | 2008-02-26 12:55:52 +0100 |
commit | 829157be590af1c2555fb74c3c4db3327e3201fc (patch) | |
tree | 75f4744449a9a06dd1186215cb2d6d5ab7235798 /arch/x86/kernel/cpu/mtrr | |
parent | 4cd20952d74323df06e438c0c3273b5be89d6bfd (diff) |
x86: handle BIOSes which terminate e820 with CF=1 and no SMAP
The proper way to terminate the e820 chain is with %ebx == 0 on the
last legitimate memory block. However, several BIOSes don't do that
and instead return error (CF = 1) when trying to read off the end of
the list. For this error return, %eax doesn't necessarily return the
SMAP signature -- correctly so, since %ah should contain an error code
in this case.
To deal with some particularly broken BIOSes, we clear the entire e820
chain if the SMAP signature is missing in the middle, indicating a
plain insane e820 implementation. However, we need to make the test
for CF = 1 before the SMAP check.
This fixes at least one HP laptop (nc6400) for which none of the
memory-probing methods (e820, e801, 88) functioned fully according to
spec.
Signed-off-by: H. Peter Anvin <hpa@zytor.com>
Signed-off-by: Ingo Molnar <mingo@elte.hu>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Diffstat (limited to 'arch/x86/kernel/cpu/mtrr')
0 files changed, 0 insertions, 0 deletions