|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-ia64-devel] [PATCH] make xenLinux/ia64 privcmd mmap not to use dom0 memory.
On Thu, May 18, 2006 at 03:30:21PM -0600, Alex Williamson wrote:
> xen privcmd uses pseudo physical addr range [0x10100000000, 0x3ffff000000]
Thank you for your testing.
>
> > +
> > +static int __init
> > +xen_ia64_privcmd_init(void)
> > +{
> > + void *efi_map_start, *efi_map_end, *p;
> > + u64 efi_desc_size;
> > + efi_memory_desc_t *md;
> > + unsigned long tmp_min;
> > + unsigned long tmp_max;
> > + unsigned long gap_size;
>
> Should we have a xen_init()/running_on_xen() and dom0 check here? I
> don't think we want to initialize this on either the transparent
> virtualization or the domU case, right?
Yes, xen_init() check is added.
>
> > +
> > + for (p = efi_map_start; p < efi_map_end; p += efi_desc_size)
> > {
> > + md = p;
> > + if (md->attribute & EFI_MEMORY_WB) {
> > + tmp_min = md_end_addr(md);
> > + }
> > + }
> > + privcmd_resource_min = GRANULEROUNDUP(tmp_min);
>
> Can this range overlap non-WB ranges? If so, it seems strange that
> we would go to so much trouble trying to tuck this at the end of memory
> or in a hole. Thanks,
You're right. fixed it.
--
yamahata
Attachment:
10036:d3c3aeb5f3c1_privcmd_mmap_pseud_physical_addr.patch _______________________________________________ Xen-ia64-devel mailing list Xen-ia64-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-ia64-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |