diff options
author | Linus Torvalds <torvalds@linux-foundation.org> | 2007-10-29 11:36:04 -0700 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@suse.de> | 2007-11-05 09:56:08 -0800 |
commit | 572b445e0403ec0b7b6e3cc3a98588dbe660139a (patch) | |
tree | 8ff9f895302276e19c86978301085ef5ac86ce4a /fs/inotify_user.c | |
parent | d91447ee784cf4954cea7e1e1018d1809d084f67 (diff) | |
download | linux-stable-572b445e0403ec0b7b6e3cc3a98588dbe660139a.tar.gz linux-stable-572b445e0403ec0b7b6e3cc3a98588dbe660139a.tar.bz2 linux-stable-572b445e0403ec0b7b6e3cc3a98588dbe660139a.zip |
Revert "x86_64: allocate sparsemem memmap above 4G"
patch 6a22c57b8d2a62dea7280a6b2ac807a539ef0716 in mainline.
This reverts commit 2e1c49db4c640b35df13889b86b9d62215ade4b6.
First off, testing in Fedora has shown it to cause boot failures,
bisected down by Martin Ebourne, and reported by Dave Jobes. So the
commit will likely be reverted in the 2.6.23 stable kernels.
Secondly, in the 2.6.24 model, x86-64 has now grown support for
SPARSEMEM_VMEMMAP, which disables the relevant code anyway, so while the
bug is not visible any more, it's become invisible due to the code just
being irrelevant and no longer enabled on the only architecture that
this ever affected.
backported to 2.6.22 by Chuck Ebbert
Reported-by: Dave Jones <davej@redhat.com>
Tested-by: Martin Ebourne <fedora@ebourne.me.uk>
Cc: Zou Nan hai <nanhai.zou@intel.com>
Cc: Suresh Siddha <suresh.b.siddha@intel.com>
Cc: Andrew Morton <akpm@linux-foundation.org>
Acked-by: Andy Whitcroft <apw@shadowen.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Chuck Ebbert <cebbert@redhat.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
Diffstat (limited to 'fs/inotify_user.c')
0 files changed, 0 insertions, 0 deletions