[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-changelog] [xen-unstable] x86: Fix 16889:60bb765b25b5 in a couple of respects:



# HG changeset patch
# User Keir Fraser <keir.fraser@xxxxxxxxxx>
# Date 1201599397 0
# Node ID e23144190f93900a0f5411461a1e16ba69d05c50
# Parent  01e178f7ec6da1d2402d6af5d8b755b9907b6c1f
x86: Fix 16889:60bb765b25b5 in a couple of respects:
 1. Leave bottom-most 1MB permanently mapped.
 2. ACPI-table mapping code shoudl be aware that mappings above 1MB of
 non-RAM are not permanent.
Signed-off-by: Keir Fraser <keir.fraser@xxxxxxxxxx>
---
 xen/arch/x86/acpi/boot.c |    3 ++-
 xen/arch/x86/mm.c        |   11 ++++++-----
 2 files changed, 8 insertions(+), 6 deletions(-)

diff -r 01e178f7ec6d -r e23144190f93 xen/arch/x86/acpi/boot.c
--- a/xen/arch/x86/acpi/boot.c  Mon Jan 28 12:58:57 2008 +0000
+++ b/xen/arch/x86/acpi/boot.c  Tue Jan 29 09:36:37 2008 +0000
@@ -110,7 +110,8 @@ char *__acpi_map_table(unsigned long phy
        unsigned long base, offset, mapped_size;
        int idx;
 
-       if (phys + size < 8 * 1024 * 1024)
+       /* XEN: RAM holes above 1MB are not permanently mapped. */
+       if (phys + size < 1 * 1024 * 1024)
                return __va(phys);
 
        offset = phys & (PAGE_SIZE - 1);
diff -r 01e178f7ec6d -r e23144190f93 xen/arch/x86/mm.c
--- a/xen/arch/x86/mm.c Mon Jan 28 12:58:57 2008 +0000
+++ b/xen/arch/x86/mm.c Tue Jan 29 09:36:37 2008 +0000
@@ -207,7 +207,7 @@ void __init arch_init_memory(void)
 {
     extern void subarch_init_memory(void);
 
-    unsigned long i, pfn, rstart_pfn, rend_pfn, ioend_pfn;
+    unsigned long i, pfn, rstart_pfn, rend_pfn, iostart_pfn, ioend_pfn;
 
     /*
      * Initialise our DOMID_XEN domain.
@@ -252,17 +252,18 @@ void __init arch_init_memory(void)
         }
 
         /*
-         * Make sure any Xen mappings are blown away.
+         * Make sure any Xen mappings of RAM holes above 1MB are blown away.
          * In particular this ensures that RAM holes are respected even in
-         * the statically-initialised 0-16MB mapping area.
+         * the statically-initialised 1-16MB mapping area.
          */
+        iostart_pfn = max_t(unsigned long, pfn, 1UL << (20 - PAGE_SHIFT));
         ioend_pfn = rstart_pfn;
 #if defined(CONFIG_X86_32)
         ioend_pfn = min_t(unsigned long, ioend_pfn,
                           DIRECTMAP_MBYTES << (20 - PAGE_SHIFT));
 #endif
-        if ( pfn < ioend_pfn )            
-            destroy_xen_mappings((unsigned long)mfn_to_virt(pfn),
+        if ( iostart_pfn < ioend_pfn )            
+            destroy_xen_mappings((unsigned long)mfn_to_virt(iostart_pfn),
                                  (unsigned long)mfn_to_virt(ioend_pfn));
 
         /* Mark as I/O up to next RAM region. */

_______________________________________________
Xen-changelog mailing list
Xen-changelog@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-changelog


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.