From mboxrd@z Thu Jan 1 00:00:00 1970 From: Andi Kleen Subject: Re: [PATCH] [arch-x86] Allow SRAT integrity check to be skipped Date: Wed, 1 Sep 2010 23:33:37 +0200 Message-ID: <20100901213337.GA8844@basil.fritz.box> References: <20100901213318.19353.54619.stgit@localhost.localdomain> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: tglx@linutronix.de, mingo@redhat.com, hpa@zytor.com, x86@kernel.org, linux-kernel@vger.kernel.org, andi@firstfloor.org, netdev@vger.kernel.org To: Peter P Waskiewicz Jr Return-path: Content-Disposition: inline In-Reply-To: <20100901213318.19353.54619.stgit@localhost.localdomain> Sender: linux-kernel-owner@vger.kernel.org List-Id: netdev.vger.kernel.org On Wed, Sep 01, 2010 at 02:33:18PM -0700, Peter P Waskiewicz Jr wrote: > On certain BIOSes, SRAT enumeration isn't exported correctly. > This leads to NUMA node enumeration failure, and causes the kernel > to fall back onto a single node treated as flat memory. This > can happen on large, multi-socket systems (4 or more sockets), and > becomes problematic for performance. > > This patch adds a boot parameter to allow a kernel to be booted > with the option to skip the SRAT check. There are BIOSes in > production that have these failures, so this will allow people > in the field to work around these BIOS issues. Looks good. Reviewed-by: Andi Kleen -Andi