|
|
|
|
|
|
|
|
|
|
xen-changelog
[Xen-changelog] [xen-unstable] [IA64] Include dummy EFI memory descripto
# HG changeset patch
# User awilliam@xxxxxxxxxxxx
# Date 1170225332 25200
# Node ID f4395e945393a4b00b6a79b86947b462023ced8c
# Parent d0b2022e2403bb4e625a4bb30b3f852aa65aff63
[IA64] Include dummy EFI memory descriptors for unmapped ranges
This eliminates a lot of warnings about dom0 trying to do UC
mappings to WB ranges. Linux doesn't deal well with holes within
a granule.
Signed-off-by: Alex Williamson <alex.williamson@xxxxxx>
---
xen/arch/ia64/xen/dom_fw.c | 12 +++++++++++-
1 files changed, 11 insertions(+), 1 deletion(-)
diff -r d0b2022e2403 -r f4395e945393 xen/arch/ia64/xen/dom_fw.c
--- a/xen/arch/ia64/xen/dom_fw.c Mon Jan 29 11:17:15 2007 -0700
+++ b/xen/arch/ia64/xen/dom_fw.c Tue Jan 30 23:35:32 2007 -0700
@@ -599,7 +599,17 @@ complete_dom0_memmap(struct domain *d,
case EFI_UNUSABLE_MEMORY:
case EFI_PAL_CODE:
- /* Discard. */
+ /*
+ * We don't really need these, but holes in the
+ * memory map may cause Linux to assume there are
+ * uncacheable ranges within a granule.
+ */
+ dom_md->type = EFI_UNUSABLE_MEMORY;
+ dom_md->phys_addr = start;
+ dom_md->virt_addr = 0;
+ dom_md->num_pages = (end - start) >> EFI_PAGE_SHIFT;
+ dom_md->attribute = EFI_MEMORY_WB;
+ num_mds++;
break;
default:
_______________________________________________
Xen-changelog mailing list
Xen-changelog@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-changelog
|
<Prev in Thread] |
Current Thread |
[Next in Thread> |
- [Xen-changelog] [xen-unstable] [IA64] Include dummy EFI memory descriptors for unmapped ranges,
Xen patchbot-unstable <=
|
|
|
|
|