[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [PATCH] xen: allow extra memory stay within lowest available range



We have a machine with 1.5 TB of memory which has a e820 that looks 
like this:

(XEN)  0000000000000000 - 000000000008f400 (usable)
(XEN)  000000000008f400 - 00000000000a0000 (reserved)
(XEN)  00000000000d0000 - 0000000000100000 (reserved)
(XEN)  0000000000100000 - 00000000c7eb0000 (usable)
(XEN)  00000000c7eb0000 - 00000000c7ed8000 (ACPI data)
(XEN)  00000000c7ed8000 - 00000000c7eda000 (ACPI NVS)
(XEN)  00000000c7eda000 - 00000000c8000000 (reserved)
(XEN)  00000000c8000000 - 00000000c8001000 (reserved)
(XEN)  00000000d8000000 - 00000000d8001000 (reserved)
(XEN)  00000000d8400000 - 00000000d8401000 (reserved)
(XEN)  00000000d8800000 - 00000000d8801000 (reserved)
(XEN)  00000000fec00000 - 00000000fec10000 (reserved)
(XEN)  00000000fee00000 - 00000000fee01000 (reserved)
(XEN)  00000000fff00000 - 0000000100000000 (reserved)
(XEN)  0000000100000000 - 000000f038000000 (usable)
(XEN)  000000f038000000 - 000000fd00000000 (reserved)
(XEN)  0000010000000000 - 0000018fff000000 (usable)

Booting with dom0_mem=1024M, 2.6.32.48 adds extra pages for ballooning
at the end, and Dom0 panics:

..
[    0.000000]  Xen: 00000000fff00000 - 0000000100000000 (reserved)
[    0.000000]  Xen: 000000f038000000 - 000000fd00000000 (reserved)
[    0.000000]  Xen: 000000fd00000000 - 000000ff40000000 (usable)
..
[    0.000000] init_memory_mapping: 0000000100000000-000000ff40000000
[    0.000000]  0100000000 - ff40000000 page 4k
[    0.000000] Kernel panic - not syncing: Cannot find space for the kernel 
page tables
..
[    0.000000]  [<ffffffff816699f9>] panic+0x8c/0x1a2
[    0.000000]  [<ffffffff81642da6>] init_memory_mapping+0x3d4/0x4b9
[    0.000000]  [<ffffffff81d068ba>] setup_arch+0x651/0xaaa
[    0.000000]  [<ffffffff81669b4b>] ? printk+0x3c/0x3e
[    0.000000]  [<ffffffff8166ba03>] ? _raw_spin_unlock_irqrestore+0x10/0x12
[    0.000000]  [<ffffffff81d00aa7>] start_kernel+0x8f/0x3ca
[    0.000000]  [<ffffffff81d002cb>] x86_64_start_reservations+0xb6/0xba
[    0.000000]  [<ffffffff81d04002>] xen_start_kernel+0x5a0/0x5a7

Below patch allows extra memory to settle on the first available memory
range that can accommodate it. Resulting e820 looks like this:

[    0.000000]  Xen: 00000000fff00000 - 0000000100000000 (reserved)
[    0.000000]  Xen: 0000000100000000 - 0000000340000000 (usable)
[    0.000000]  Xen: 000000f038000000 - 000000fd00000000 (reserved)

This patch is moot on 3.2 and later because another patch already handles
this case: dc91c728fddc29dfed1ae96f6807216b5f42d3a1 xen: allow extra
memory to be in multiple regions.

Signed-off-by: Jacob Shin <jacob.shin@xxxxxxx>
---
 arch/x86/xen/setup.c |    6 ++++--
 1 files changed, 4 insertions(+), 2 deletions(-)

diff --git a/arch/x86/xen/setup.c b/arch/x86/xen/setup.c
index 46d6d21..1ce626d 100644
--- a/arch/x86/xen/setup.c
+++ b/arch/x86/xen/setup.c
@@ -240,6 +240,7 @@ char * __init xen_memory_setup(void)
        memcpy(map_raw, map, sizeof(map));
        e820.nr_map = 0;
        xen_extra_mem_start = mem_end;
+       extra_limit = xen_get_max_pages();
        for (i = 0; i < memmap.nr_entries; i++) {
                unsigned long long end;
 
@@ -268,7 +269,9 @@ char * __init xen_memory_setup(void)
                }
 
                if (map[i].size > 0 && end > xen_extra_mem_start)
-                       xen_extra_mem_start = end;
+                       if (PFN_DOWN(map[i].addr - xen_extra_mem_start) <
+                               (extra_limit - max_pfn))
+                               xen_extra_mem_start = end;
 
                /* Add region if any remains */
                if (map[i].size > 0)
@@ -305,7 +308,6 @@ char * __init xen_memory_setup(void)
 
        sanitize_e820_map(e820.map, ARRAY_SIZE(e820.map), &e820.nr_map);
 
-       extra_limit = xen_get_max_pages();
        if (max_pfn + extra_pages > extra_limit) {
                if (extra_limit > max_pfn)
                        extra_pages = extra_limit - max_pfn;
-- 
1.7.8.4



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.