diff options
author | Yinghai Lu <yhlu.kernel.send@gmail.com> | 2008-04-14 23:40:37 -0400 |
---|---|---|
committer | Ingo Molnar <mingo@elte.hu> | 2008-05-12 15:28:10 -0400 |
commit | 7677b2ef6c0c4fddc84f6473f3863f40eb71821b (patch) | |
tree | 165d77d56acf37398ff75261e80a96d763e3442b /crypto/cipher.c | |
parent | 8c9fd91a0dc503f085169d44f4360be025f75224 (diff) |
x86_64: allocate gart aperture from 512M
because we try to reserve dma32 early, so we have chance to get aperture
from 64M.
with some sequence aperture allocated from RAM, could become E820_RESERVED.
and then if doing a kexec with a big kernel that uncompressed size is above
64M we could have a range conflict with still using gart.
So allocate gart aperture from 512M instead.
Also change the fallback_aper_order to 5, because we don't have chance to get
2G or 4G aperture.
Signed-off-by: Yinghai Lu <yhlu.kernel@gmail.com>
Signed-off-by: Ingo Molnar <mingo@elte.hu>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Diffstat (limited to 'crypto/cipher.c')
0 files changed, 0 insertions, 0 deletions