aboutsummaryrefslogtreecommitdiffstats
path: root/arch/x86/kernel/e820_64.c
diff options
context:
space:
mode:
authorPaul Jackson <pj@sgi.com>2008-05-14 11:15:34 -0400
committerThomas Gleixner <tglx@linutronix.de>2008-05-25 04:55:11 -0400
commitc3965bd15118742d72b4bc1a290d37b3f081eb98 (patch)
tree3c3acbdb900a54800d9f427b19ffb156ab16308f /arch/x86/kernel/e820_64.c
parentb25e31cec7788ccba5749d10f8f4343fffff4750 (diff)
x86 boot: proper use of ARRAY_SIZE instead of repeated E820MAX constant
This patch is motivated by a subsequent patch which will allow for more memory map entries on EFI supported systems than can be passed via the x86 legacy BIOS E820 interface. The legacy interface is limited to E820MAX == 128 memory entries, and that "E820MAX" manifest constant was used as the size for several arrays and loops over those arrays. The primary change in this patch is to change code loop sizes over those arrays from using the constant E820MAX, to using the ARRAY_SIZE() macro evaluated for the array being looped. That way, a subsequent patch can change the size of some of these arrays, without breaking this code. This patch also adds a parameter to the sanitize_e820_map() routine, which had an implicit size for the array passed it of E820MAX entries. This new parameter explicitly passes the size of said array. Once again, this will allow a subsequent patch to change that array size for some calls to sanitize_e820_map() without breaking the code. As part of enhancing the sanitize_e820_map() interface this way, I further combined the unnecessarily distinct x86_32 and x86_64 declarations for this routine into a single, commonly used, declaration. This patch in itself should make no difference to the resulting kernel binary. [ mingo@elte.hu: merged to -tip ] Signed-off-by: Paul Jackson <pj@sgi.com> Signed-off-by: Ingo Molnar <mingo@elte.hu>
Diffstat (limited to 'arch/x86/kernel/e820_64.c')
-rw-r--r--arch/x86/kernel/e820_64.c6
1 files changed, 4 insertions, 2 deletions
diff --git a/arch/x86/kernel/e820_64.c b/arch/x86/kernel/e820_64.c
index c10b4aece5e4..58dc6eee4d4f 100644
--- a/arch/x86/kernel/e820_64.c
+++ b/arch/x86/kernel/e820_64.c
@@ -413,7 +413,9 @@ char *__init machine_specific_memory_setup(void)
413 * Otherwise fake a memory map; one section from 0k->640k, 413 * Otherwise fake a memory map; one section from 0k->640k,
414 * the next section from 1mb->appropriate_mem_k 414 * the next section from 1mb->appropriate_mem_k
415 */ 415 */
416 sanitize_e820_map(boot_params.e820_map, &boot_params.e820_entries); 416 sanitize_e820_map(boot_params.e820_map,
417 ARRAY_SIZE(boot_params.e820_map),
418 &boot_params.e820_entries);
417 if (copy_e820_map(boot_params.e820_map, boot_params.e820_entries) < 0) 419 if (copy_e820_map(boot_params.e820_map, boot_params.e820_entries) < 0)
418 early_panic("Cannot find a valid memory map"); 420 early_panic("Cannot find a valid memory map");
419 printk(KERN_INFO "BIOS-provided physical RAM map:\n"); 421 printk(KERN_INFO "BIOS-provided physical RAM map:\n");
@@ -484,7 +486,7 @@ void __init finish_e820_parsing(void)
484 if (userdef) { 486 if (userdef) {
485 char nr = e820.nr_map; 487 char nr = e820.nr_map;
486 488
487 if (sanitize_e820_map(e820.map, &nr) < 0) 489 if (sanitize_e820_map(e820.map, ARRAY_SIZE(e820.map), &nr) < 0)
488 early_panic("Invalid user supplied memory map"); 490 early_panic("Invalid user supplied memory map");
489 e820.nr_map = nr; 491 e820.nr_map = nr;
490 492