On Fri, 29 Apr, at 10:41:19AM, Alex Thorlton wrote: > > You can see here that we've made it past the MMR read in uv_system_init, > but we die inside of our first EFI callback. In this example, it looks > like we're using the kernel page table at the time of the failure, and I > believe that the failing address is somewhere in our EFI runtime code: > > [ 0.803396] efi: ATHORLTON EFI md dump: > [ 0.803396] type: 5 > [ 0.803396] pad: 0 > [ 0.803396] phys_addr: 6a0a6000 > [ 0.803396] virt_addr: 0 > [ 0.803396] num_pages: 184 > [ 0.803396] attribute: 800000000000000f > > So it looks like we're trying to read from EFI runtime space while using > the kernel page table, which fails, presumably because the space is also > not mapped into the kernel page table. While I understand *why* it > fails, and why the address isn't mapped, I don't fully know how we > should handle fixing it. How come you're not using the new EFI page tables while making EFI runtime calls? Who owns the MMR space and what is it used for? Do both the kernel and the firmware need access to it? My SGI UV knowledge is zero, so I'm happy to be educated! I can't think of any analogous memory regions on x86 where the EFI services require the kernel to map them, other than the EFI regions themselves. Runtime EFI regions should be opaque, isolated and self-contained. This is why there are two phases of execution for firmware; before and after ExitBootServices(). Once the kernel takes control after ExitBootServices() firmware can no longer provide timer services, for example, and doesn't care where the kernel maps the LAPIC because it never tries to access it. The fact that the UV firmware does care where the MMR space is mapped makes me suspect that there's a lack of isolation. -- To unsubscribe from this list: send the line "unsubscribe linux-efi" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html