|
|
|
|
|
|
|
|
|
|
xen-ia64-devel
[Xen-ia64-devel] [rfc 15/15] Kexec: Map runtime EFI regions the same way
Map EFI regions into the same place they are maped into in Linux.
This is because of an unfortunate problem with the way that
EFI interacts with Kexec. The call to map the EFI regions
may only be made once. This means that after Kexec the EFI
regions must be mapped into the same region that they
were mapped into prior to Kexec.
This is not
usually a problem when kexecing from xen to xen or from linux to linux,
as the mapping will be the same. However when kexecing from xen to linux
or linux to xen, the mapping is different, and the problem manifests.
So far Magnus Damm and I have come up with three different ideas for
resolving this problem.
1. Leave the EFI in physical mode
- This is nice and simple
- There is a potential performance hit, but PAL calls are not
made very often, so it shouldn't be a problem
- I have patches to do this, some of which are in the
series that accompany this patch.
- The SGI people tell me that it won't work on SN because
it allows the OS to provide EFI (or SAL?) code.
2. Always map EFI into the space that Linux uses
- Not so simple
- Requires Xen to jump through some hoops
- But leaves Linux unmodified
- But it will break if Linux ever changes its mapping
- This patch series implements this change
3. Always map EFI to some agreed space
- Similar to 2. but less likely to break in the future
- But it requires Xen and Linux to agree on a space to be used
- Reqires both Xen and Linux to be modified
Signed-off-by: Simon Horman <horms@xxxxxxxxxxxx>
Index: xen-unstable.hg/xen/arch/ia64/linux-xen/efi.c
===================================================================
--- xen-unstable.hg.orig/xen/arch/ia64/linux-xen/efi.c 2007-08-16
16:45:09.000000000 +0900
+++ xen-unstable.hg/xen/arch/ia64/linux-xen/efi.c 2007-08-16
16:45:09.000000000 +0900
@@ -629,6 +629,17 @@ efi_enter_virtual_mode (void)
for (p = efi_map_start; p < efi_map_end; p += efi_desc_size) {
md = p;
+#ifdef XEN
+ if (md->attribute & EFI_MEMORY_RUNTIME) {
+ if (md->attribute & EFI_MEMORY_WB)
+ md->virt_addr = __IA64_EFI_CACHED_OFFSET|
+ md->phys_addr;
+ else if (md->attribute & (EFI_MEMORY_UC|EFI_MEMORY_WC|
+ EFI_MEMORY_WT))
+ md->virt_addr = __IA64_EFI_UNCACHED_OFFSET|
+ md->phys_addr;
+ }
+#else
if (md->attribute & EFI_MEMORY_RUNTIME) {
/*
* Some descriptors have multiple bits set, so the
order of
@@ -661,6 +672,7 @@ efi_enter_virtual_mode (void)
#endif
}
}
+#endif
}
if ((unsigned long)__va(runtime->set_virtual_address_map) ==
--
--
Horms
H: http://www.vergenet.net/~horms/
W: http://www.valinux.co.jp/en/
_______________________________________________
Xen-ia64-devel mailing list
Xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-ia64-devel
|
<Prev in Thread] |
Current Thread |
[Next in Thread>
|
- [Xen-ia64-devel] [rfc 00/15] Kexec v20070717: Xen, Simon Horman
- [Xen-ia64-devel] [rfc 05/15] Kdump: Save dom0_mm_pgd_mfn in vmcore on ia64, Simon Horman
- [Xen-ia64-devel] [rfc 15/15] Kexec: Map runtime EFI regions the same way as Linux,
Simon Horman <=
- [Xen-ia64-devel] [rfc 03/15] physical mode SAL calls, Simon Horman
- [Xen-ia64-devel] [rfc 02/15] physical mode SAL calls, Simon Horman
- [Xen-ia64-devel] [rfc 08/15] Kexec: Save the MADT ACPI tables so that they can be restored, Simon Horman
- [Xen-ia64-devel] [rfc 10/15] Kexec: Zap VHPT in relocate_kernel, Simon Horman
- [Xen-ia64-devel] [rfc 07/15] Kexec: partial port of CPU_HOTPLUG, Simon Horman
- [Xen-ia64-devel] [rfc 04/15] Kdump: Save dom0_mm_pgd_mfn in vmcore on ia64, Simon Horman
- [Xen-ia64-devel] [rfc 01/15] kexec for xen, Simon Horman
- [Xen-ia64-devel] [rfc 06/15] Kexec: Add kexec_disable_iosapic, Simon Horman
- [Xen-ia64-devel] [rfc 12/15] Kexec: map EFI after paging is initilaised, Simon Horman
- [Xen-ia64-devel] [rfc 13/15] Kexec: offsets for EFI runtime regions, Simon Horman
|
|
|
|
|