Found a small problem.  With this patch in place I get
a complaint while booting on an Intel tiger:

Trying to vfree() bad address (a00000020001b000)
BUG: at vm/vmalloc.c:323 __vunmap()

The stack trace points back to drivers/firmware/dmi_scan.c
in dmi_table()

        buf = dmi_ioremap(base, len);
                ...
        dmi_iounmap(buf, len);

Before applying your patch we have base=0x7fefb000 len=0xfbc
and the return value is 0xc00000007fefb000

After your patch, we get buf = 0xa00000020001b000

-Tony
-
To unsubscribe from this list: send the line "unsubscribe linux-ia64" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to