WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

Re: [Xen-devel] 2.6.32 pv_ops and sparse/flat memory

To: Vasiliy G Tolstov <v.tolstov@xxxxxxxxx>
Subject: Re: [Xen-devel] 2.6.32 pv_ops and sparse/flat memory
From: Daniel Kiper <dkiper@xxxxxxxxxxxx>
Date: Tue, 23 Nov 2010 19:06:49 +0100
Cc: "xen-devel@xxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxx>, Daniel Kiper <dkiper@xxxxxxxxxxxx>
Delivery-date: Tue, 23 Nov 2010 10:07:33 -0800
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <1290421350.17994.106.camel@vase>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
References: <1290174257.16244.44.camel@vase> <20101122100915.GA19265@xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx> <1290421350.17994.106.camel@vase>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
User-agent: Mutt/1.3.28i
Hello,

On Mon, Nov 22, 2010 at 01:22:30PM +0300, Vasiliy G Tolstov wrote:
> On Mon, 2010-11-22 at 11:09 +0100, Daniel Kiper wrote:
> > Hello,
> >
> > On Fri, Nov 19, 2010 at 04:44:17PM +0300, Vasiliy G Tolstov wrote:
> > > Hello. I'm try to compile 32 bit pae kernel from xen git repo. If i
> > > check sparse memory - i get error
> >
> > Please send me full address of Xen repository which you are using
> > its head
>
> git clone git://git.kernel.org/pub/scm/linux/kernel/git/jeremy/xen
> git checkout -b xen/stable-2.6.32.x origin/xen/stable-2.6.32.x
>
> > and contents of your config file.
> in attach, modify flat memory to sparse mem and compile under i686 arch

As I find out it is normal behavior when CONFIG_XEN is enabled in this
kernel version. Unlike mainline kernel this version establish new PG_foreign
page flag which with CONFIG_SPARSEMEM_MANUAL and CONFIG_HIGHMEM64G
enabled overflow page flags field which is - surprise - 32-bit long in
i386 (for more details read include/linux/page-flags.h file).

Solution:
  - enable CONFIG_HIGHMEM4G,
  - disable CONFIG_XEN (I am not sure that it
    is good one for you :-))) ).

Daniel

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel