[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-changelog] [xen-unstable] rombios: remove unnecessary function calls.



# HG changeset patch
# User Keir Fraser <keir.fraser@xxxxxxxxxx>
# Date 1232023304 0
# Node ID d84504432e611beb407ff4de29ab29a59187a3ea
# Parent  04f913ab2049bd0d8f13cdd72a487376d3909f87
rombios: remove unnecessary function calls.

The rombios always becomes read-only after using 32bit gateway.
That is not handy for using the gateway.

Signed-off-by: Kouya Shimura <kouya@xxxxxxxxxxxxxx>
---
 tools/firmware/rombios/32bitgateway.c |   11 +++--------
 1 files changed, 3 insertions(+), 8 deletions(-)

diff -r 04f913ab2049 -r d84504432e61 tools/firmware/rombios/32bitgateway.c
--- a/tools/firmware/rombios/32bitgateway.c     Thu Jan 15 12:40:48 2009 +0000
+++ b/tools/firmware/rombios/32bitgateway.c     Thu Jan 15 12:41:44 2009 +0000
@@ -126,18 +126,18 @@ gdt_entry_pm_cs:
 gdt_entry_pm_cs:
     ; 32 bit code segment for protected mode
     .word 0xffff, 0x0000
-    .byte 0x00, 0x9a, 0xcf, 0x00
+    .byte 0x00, 0x9b, 0xcf, 0x00
 
 gdt_entry_pm_16bit_cs:
     ; temp. 16 bit code segment used while in protected mode
     .word 0xffff, 0x0000
-    .byte SEGMENT_OFFSET >> 16, 0x9a, 0x0, 0x0
+    .byte SEGMENT_OFFSET >> 16, 0x9b, 0x0, 0x0
 
 gdt_entry_pm_32bit_ds:
     ; (32 bit) data segment (r/w) reaching all possible areas in 32bit memory
     ; 4kb granularity
     .word 0xffff, 0x0000
-    .byte 0x0, 0x92, 0xcf, 0x0
+    .byte 0x0, 0x93, 0xcf, 0x0
 gdt_entry_end:
 
 my_gdtdesc:
@@ -356,9 +356,6 @@ Upcall:
        call _store_returnaddress       ; store away
        pop ax
 
-       ; XXX GDT munging requires ROM to be writable!
-       call _enable_rom_write_access
-
        rol bx, #2
        mov si, #jmptable
        seg cs
@@ -384,8 +381,6 @@ Upcall:
        push bp
        mov bp,sp
        push eax                        ; preserve work register
-
-       call _disable_rom_write_access
 
        call _get_returnaddress
        mov 2[bp], ax                   ; 16bit return address onto stack

_______________________________________________
Xen-changelog mailing list
Xen-changelog@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-changelog


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.