|
|
|
|
|
|
|
|
|
|
xen-ia64-devel
Re: [Xen-ia64-devel] [PATCH] make xenLinux/ia64 privcmd mmap not to use
On Thu, May 18, 2006 at 03:30:21PM -0600, Alex Williamson wrote:
> xen privcmd uses pseudo physical addr range [0x10100000000, 0x3ffff000000]
Thank you for your testing.
>
> > +
> > +static int __init
> > +xen_ia64_privcmd_init(void)
> > +{
> > + void *efi_map_start, *efi_map_end, *p;
> > + u64 efi_desc_size;
> > + efi_memory_desc_t *md;
> > + unsigned long tmp_min;
> > + unsigned long tmp_max;
> > + unsigned long gap_size;
>
> Should we have a xen_init()/running_on_xen() and dom0 check here? I
> don't think we want to initialize this on either the transparent
> virtualization or the domU case, right?
Yes, xen_init() check is added.
>
> > +
> > + for (p = efi_map_start; p < efi_map_end; p += efi_desc_size)
> > {
> > + md = p;
> > + if (md->attribute & EFI_MEMORY_WB) {
> > + tmp_min = md_end_addr(md);
> > + }
> > + }
> > + privcmd_resource_min = GRANULEROUNDUP(tmp_min);
>
> Can this range overlap non-WB ranges? If so, it seems strange that
> we would go to so much trouble trying to tuck this at the end of memory
> or in a hole. Thanks,
You're right. fixed it.
--
yamahata
10036:d3c3aeb5f3c1_privcmd_mmap_pseud_physical_addr.patch
Description: Text document
_______________________________________________
Xen-ia64-devel mailing list
Xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-ia64-devel
|
|
|
|
|