[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <alpine.LFD.2.00.0810151630050.3288@nehalem.linux-foundation.org>
Date: Wed, 15 Oct 2008 16:40:41 -0700 (PDT)
From: Linus Torvalds <torvalds@...ux-foundation.org>
To: Bob Montgomery <bob.montgomery@...com>
cc: "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
vojtech@...e.cz, chandru@...ibm.com
Subject: Re: [PATCH] disable CPU side GART accesses
On Wed, 15 Oct 2008, Bob Montgomery wrote:
>
> This patch changes the initialization of the GART to set the DISGARTCPU
> bit in the GART Aperture Control Register (AMD64_GARTAPERTURECTL).
> Setting the bit prevents requests from the CPUs from accessing the
> GART. In other words, CPU memory accesses to the aperture address
> range will not cause the GART to perform an address translation.
> The aperture area is currently being unmapped at the kernel level
> with set_memory_np() in gart_iommu_init to prevent accesses from the
> CPU [...]
Would this allow us to get rid of that particular hackup code sequence
entirely? Or do we still need them for other chip versions etc?
Also, the whole iommu/gart thing seems to have a lot of people who have
worked on it, are the right people cc'd? Pavel seems to have touched the
code last, but it seems to be originally done by Andi and then with
touches by DaveJ.
I get the feeling that the people cc'd are kdump people, not iommu/gart
people, which is a bit sad.
Linus
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists