|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH] xen: allow extra memory stay within lowest available range
We have a machine with 1.5 TB of memory which has a e820 that looks
like this:
(XEN) 0000000000000000 - 000000000008f400 (usable)
(XEN) 000000000008f400 - 00000000000a0000 (reserved)
(XEN) 00000000000d0000 - 0000000000100000 (reserved)
(XEN) 0000000000100000 - 00000000c7eb0000 (usable)
(XEN) 00000000c7eb0000 - 00000000c7ed8000 (ACPI data)
(XEN) 00000000c7ed8000 - 00000000c7eda000 (ACPI NVS)
(XEN) 00000000c7eda000 - 00000000c8000000 (reserved)
(XEN) 00000000c8000000 - 00000000c8001000 (reserved)
(XEN) 00000000d8000000 - 00000000d8001000 (reserved)
(XEN) 00000000d8400000 - 00000000d8401000 (reserved)
(XEN) 00000000d8800000 - 00000000d8801000 (reserved)
(XEN) 00000000fec00000 - 00000000fec10000 (reserved)
(XEN) 00000000fee00000 - 00000000fee01000 (reserved)
(XEN) 00000000fff00000 - 0000000100000000 (reserved)
(XEN) 0000000100000000 - 000000f038000000 (usable)
(XEN) 000000f038000000 - 000000fd00000000 (reserved)
(XEN) 0000010000000000 - 0000018fff000000 (usable)
Booting with dom0_mem=1024M, 2.6.32.48 adds extra pages for ballooning
at the end, and Dom0 panics:
..
[ 0.000000] Xen: 00000000fff00000 - 0000000100000000 (reserved)
[ 0.000000] Xen: 000000f038000000 - 000000fd00000000 (reserved)
[ 0.000000] Xen: 000000fd00000000 - 000000ff40000000 (usable)
..
[ 0.000000] init_memory_mapping: 0000000100000000-000000ff40000000
[ 0.000000] 0100000000 - ff40000000 page 4k
[ 0.000000] Kernel panic - not syncing: Cannot find space for the kernel
page tables
..
[ 0.000000] [<ffffffff816699f9>] panic+0x8c/0x1a2
[ 0.000000] [<ffffffff81642da6>] init_memory_mapping+0x3d4/0x4b9
[ 0.000000] [<ffffffff81d068ba>] setup_arch+0x651/0xaaa
[ 0.000000] [<ffffffff81669b4b>] ? printk+0x3c/0x3e
[ 0.000000] [<ffffffff8166ba03>] ? _raw_spin_unlock_irqrestore+0x10/0x12
[ 0.000000] [<ffffffff81d00aa7>] start_kernel+0x8f/0x3ca
[ 0.000000] [<ffffffff81d002cb>] x86_64_start_reservations+0xb6/0xba
[ 0.000000] [<ffffffff81d04002>] xen_start_kernel+0x5a0/0x5a7
Below patch allows extra memory to settle on the first available memory
range that can accommodate it. Resulting e820 looks like this:
[ 0.000000] Xen: 00000000fff00000 - 0000000100000000 (reserved)
[ 0.000000] Xen: 0000000100000000 - 0000000340000000 (usable)
[ 0.000000] Xen: 000000f038000000 - 000000fd00000000 (reserved)
This patch is moot on 3.2 and later because another patch already handles
this case: dc91c728fddc29dfed1ae96f6807216b5f42d3a1 xen: allow extra
memory to be in multiple regions.
Signed-off-by: Jacob Shin <jacob.shin@xxxxxxx>
---
arch/x86/xen/setup.c | 6 ++++--
1 files changed, 4 insertions(+), 2 deletions(-)
diff --git a/arch/x86/xen/setup.c b/arch/x86/xen/setup.c
index 46d6d21..1ce626d 100644
--- a/arch/x86/xen/setup.c
+++ b/arch/x86/xen/setup.c
@@ -240,6 +240,7 @@ char * __init xen_memory_setup(void)
memcpy(map_raw, map, sizeof(map));
e820.nr_map = 0;
xen_extra_mem_start = mem_end;
+ extra_limit = xen_get_max_pages();
for (i = 0; i < memmap.nr_entries; i++) {
unsigned long long end;
@@ -268,7 +269,9 @@ char * __init xen_memory_setup(void)
}
if (map[i].size > 0 && end > xen_extra_mem_start)
- xen_extra_mem_start = end;
+ if (PFN_DOWN(map[i].addr - xen_extra_mem_start) <
+ (extra_limit - max_pfn))
+ xen_extra_mem_start = end;
/* Add region if any remains */
if (map[i].size > 0)
@@ -305,7 +308,6 @@ char * __init xen_memory_setup(void)
sanitize_e820_map(e820.map, ARRAY_SIZE(e820.map), &e820.nr_map);
- extra_limit = xen_get_max_pages();
if (max_pfn + extra_pages > extra_limit) {
if (extra_limit > max_pfn)
extra_pages = extra_limit - max_pfn;
--
1.7.8.4
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |