-
由 Linus Torvalds 提交于
The point is to take all RAM resources we have, and _after_ we've added all the resources we've seen in the E820 tree, we then _also_ try to add fake reserved entries for any "round up to X" at the end of the RAM resources. [ Impact: improve PCI mem-resource allocation robustness, protect "stolen RAM" ] Reported-by: NYannick Roehlly <yannick.roehlly@free.fr> Acked-by: NJesse Barnes <jesse.barnes@intel.com> Signed-off-by: NYinghai Lu <yinghai@kernel.org> Cc: Ivan Kokshaysky <ink@jurassic.park.msu.ru> Cc: Andrew Morton <akpm@linux-foundation.org> Cc: yannick.roehlly@free.fr LKML-Reference: <4A01A784.2050407@kernel.org> Signed-off-by: NIngo Molnar <mingo@elte.hu>
45fbe3ee