search for: check_bugs

Displaying 20 results from an estimated 24 matches for "check_bugs".

2011 Sep 01
3
HVM guests and pvlocks not working as expected
...lucky if pv spinlocks in HVM worked for anybody. The xen_hvm_smp_init() call will change the smp_ops hooks. One of which is smp_prepare_cpus. This is done in start_kernel and at this point in time, there is no change to the pv_lock_ops and they point to the ticket versions. Later in start_kernel, check_bugs is called and part of that takes the pv_lock_ops and patches the kernel with the correct jumps. _After_ that, the kernel_init is called and that in turn does the smp_prepare_cpus which now changes the pv_lock_ops again, *but not* run any patching again. So the _raw_spin_*lock calls still use the ti...
2007 Apr 18
1
[PATCH 1/2] Clean up asm-x86_64/bugs.h
...===================== --- /dev/null +++ b/arch/x86_64/kernel/bugs.c @@ -0,0 +1,28 @@ +/* + * arch/x86_64/kernel/bugs.c + * + * Copyright (C) 1994 Linus Torvalds + * Copyright (C) 2000 SuSE + * + * This is included by init/main.c to check for architecture-dependent bugs. + * + * Needs: + * void check_bugs(void); + */ + +#include <linux/kernel.h> +#include <asm/alternative.h> +#include <asm/processor.h> +#include <asm/i387.h> +#include <asm/msr.h> +#include <asm/pda.h> + +void __init check_bugs(void) +{ + identify_cpu(&boot_cpu_data); +#if !defined(CONFIG_SMP)...
2007 Apr 18
1
[PATCH 1/2] Clean up asm-x86_64/bugs.h
...===================== --- /dev/null +++ b/arch/x86_64/kernel/bugs.c @@ -0,0 +1,28 @@ +/* + * arch/x86_64/kernel/bugs.c + * + * Copyright (C) 1994 Linus Torvalds + * Copyright (C) 2000 SuSE + * + * This is included by init/main.c to check for architecture-dependent bugs. + * + * Needs: + * void check_bugs(void); + */ + +#include <linux/kernel.h> +#include <asm/alternative.h> +#include <asm/processor.h> +#include <asm/i387.h> +#include <asm/msr.h> +#include <asm/pda.h> + +void __init check_bugs(void) +{ + identify_cpu(&boot_cpu_data); +#if !defined(CONFIG_SMP)...
2015 Mar 19
2
[PATCH 9/9] qspinlock, x86, kvm: Implement KVM support for paravirt qspinlock
On 03/16/2015 09:16 AM, Peter Zijlstra wrote: > Implement the paravirt qspinlock for x86-kvm. > > We use the regular paravirt call patching to switch between: > > native_queue_spin_lock_slowpath() __pv_queue_spin_lock_slowpath() > native_queue_spin_unlock() __pv_queue_spin_unlock() > > We use a callee saved call for the unlock function which reduces the > i-cache
2015 Mar 19
2
[PATCH 9/9] qspinlock, x86, kvm: Implement KVM support for paravirt qspinlock
On 03/16/2015 09:16 AM, Peter Zijlstra wrote: > Implement the paravirt qspinlock for x86-kvm. > > We use the regular paravirt call patching to switch between: > > native_queue_spin_lock_slowpath() __pv_queue_spin_lock_slowpath() > native_queue_spin_unlock() __pv_queue_spin_unlock() > > We use a callee saved call for the unlock function which reduces the > i-cache
2007 Apr 18
4
[patch 0/4] Clean up asm/bugs.h, identify_cpu() and update COMPAT_VDSO
Hi Andi, Four patches: - clean up asm/bugs.h, by moving all the C code into its own C file - split identify_cpu() into boot and secondary variants, so that boot-time setup functions can be marked __init - repost of the COMPAT_VDSO patches with a bit more robustness from unknown DT_tags, and functions marked __init, since all this is boot-time only setup. Thanks, J --
2007 Apr 18
4
[patch 0/4] Clean up asm/bugs.h, identify_cpu() and update COMPAT_VDSO
Hi Andi, Four patches: - clean up asm/bugs.h, by moving all the C code into its own C file - split identify_cpu() into boot and secondary variants, so that boot-time setup functions can be marked __init - repost of the COMPAT_VDSO patches with a bit more robustness from unknown DT_tags, and functions marked __init, since all this is boot-time only setup. Thanks, J --
2015 Mar 19
0
[PATCH 9/9] qspinlock,x86,kvm: Implement KVM support for paravirt qspinlock
...hen jump to a random location. I believe that was causing the system > panic that I saw. > > So I think it is kind of risky to use it here unless we can guarantee that > call site patching is atomic wrt other CPUs. Just look at where the patching is done: init/main.c:start_kernel() check_bugs() alternative_instructions() apply_paravirt() We're UP and not holding any locks, disable IRQs (see text_poke_early()) and have NMIs 'disabled'.
2015 Mar 19
1
[PATCH 9/9] qspinlock, x86, kvm: Implement KVM support for paravirt qspinlock
...elieve that was causing the system >> panic that I saw. >> >> So I think it is kind of risky to use it here unless we can guarantee that >> call site patching is atomic wrt other CPUs. > Just look at where the patching is done: > > init/main.c:start_kernel() > check_bugs() > alternative_instructions() > apply_paravirt() > > We're UP and not holding any locks, disable IRQs (see text_poke_early()) > and have NMIs 'disabled'. You are probably right. The initial apply_paravirt() was done before the SMP boot. Subsequent ones were...
2015 Mar 19
0
[PATCH 9/9] qspinlock,x86,kvm: Implement KVM support for paravirt qspinlock
...hen jump to a random location. I believe that was causing the system > panic that I saw. > > So I think it is kind of risky to use it here unless we can guarantee that > call site patching is atomic wrt other CPUs. Just look at where the patching is done: init/main.c:start_kernel() check_bugs() alternative_instructions() apply_paravirt() We're UP and not holding any locks, disable IRQs (see text_poke_early()) and have NMIs 'disabled'.
2015 Mar 19
1
[PATCH 9/9] qspinlock, x86, kvm: Implement KVM support for paravirt qspinlock
...elieve that was causing the system >> panic that I saw. >> >> So I think it is kind of risky to use it here unless we can guarantee that >> call site patching is atomic wrt other CPUs. > Just look at where the patching is done: > > init/main.c:start_kernel() > check_bugs() > alternative_instructions() > apply_paravirt() > > We're UP and not holding any locks, disable IRQs (see text_poke_early()) > and have NMIs 'disabled'. You are probably right. The initial apply_paravirt() was done before the SMP boot. Subsequent ones were...
2013 Jan 21
1
Bug#698651: xen-hypervisor-4.1-amd64: PMU (performance monitoring) unit may be unexpectedly enabled on Dom0
...d: 1, comm: swapper/0 Not tainted 3.2.0-4-amd64 #1 Debian 3.2.35-2 [ 0.016224] Call Trace: [ 0.016257] [<ffffffff81046a75>] ? warn_slowpath_common+0x78/0x8c [ 0.016289] [<ffffffff816b2f72>] ? init_hw_perf_events+0x246/0x3e1 [ 0.016319] [<ffffffff816b2d2c>] ? check_bugs+0x2b/0x2b [ 0.016351] [<ffffffff81002085>] ? do_one_initcall+0x75/0x12c [ 0.016383] [<ffffffff816abbcb>] ? kernel_init+0x8d/0x152 [ 0.016414] [<ffffffff81354174>] ? kernel_thread_helper+0x4/0x10 [ 0.016447] [<ffffffff81352233>] ? int_ret_from_sys_call...
2007 Apr 18
0
[PATCH 2/2] x86: clean up identify_cpu
...t sysenter_setup(void) { void *syscall_page = (void *)get_zeroed_page(GFP_ATOMIC); syscall_pages[0] = virt_to_page(syscall_page); =================================================================== --- a/arch/x86_64/kernel/bugs.c +++ b/arch/x86_64/kernel/bugs.c @@ -19,7 +19,7 @@ void __init check_bugs(void) { - identify_cpu(&boot_cpu_data); + identify_boot_cpu(); #if !defined(CONFIG_SMP) printk("CPU: "); print_cpu_info(&boot_cpu_data); =================================================================== --- a/arch/x86_64/kernel/setup.c +++ b/arch/x86_64/kernel/setup.c @@ -...
2007 Apr 18
0
[PATCH 2/2] x86: clean up identify_cpu
...t sysenter_setup(void) { void *syscall_page = (void *)get_zeroed_page(GFP_ATOMIC); syscall_pages[0] = virt_to_page(syscall_page); =================================================================== --- a/arch/x86_64/kernel/bugs.c +++ b/arch/x86_64/kernel/bugs.c @@ -19,7 +19,7 @@ void __init check_bugs(void) { - identify_cpu(&boot_cpu_data); + identify_boot_cpu(); #if !defined(CONFIG_SMP) printk("CPU: "); print_cpu_info(&boot_cpu_data); =================================================================== --- a/arch/x86_64/kernel/setup.c +++ b/arch/x86_64/kernel/setup.c @@ -...
1997 Nov 13
0
Linux F00F Patch [Forwarded e-mail from Aleph One]
...ug detected - turning on workaround.\n"); + pentium_f00f_bug = 1; + trap_init_f00f_bug(); + } else { + printk(KERN_INFO " no F0 0F bug in this CPU, great!\n"); + pentium_f00f_bug = 0; + } +} + __initfunc(static void check_bugs(void)) { check_tlb(); @@ -173,5 +199,6 @@ check_hlt(); check_popad(); check_amd_k6(); + check_pentium_f00f(); system_utsname.machine[1] = ''0'' + x86; } ------- end -------
2007 Apr 18
31
[PATCH 00/28] Updates for firstfloor paravirt-ops patches
Hi Andi, This is a set of updates for the firstfloor patch queue. Quick rundown: revert-mm-x86_64-mm-account-for-module-percpu-space-separately-from-kernel-percpu.patch separate-module-percpu-space.patch Update the module percpu accounting patch fix-ff-allow-percpu-variables-to-be-page-aligned.patch Make sure the percpu memory allocation is page-aligned
2007 Apr 18
31
[PATCH 00/28] Updates for firstfloor paravirt-ops patches
Hi Andi, This is a set of updates for the firstfloor patch queue. Quick rundown: revert-mm-x86_64-mm-account-for-module-percpu-space-separately-from-kernel-percpu.patch separate-module-percpu-space.patch Update the module percpu accounting patch fix-ff-allow-percpu-variables-to-be-page-aligned.patch Make sure the percpu memory allocation is page-aligned
2018 Oct 29
2
guestfs launch failed in CentOS 7.5
...ot_cold_page+0x106/0x160 [ 110.721000] [<ffffffffad99bc6d>] ? adjust_managed_page_count+0x5d/0x80 [ 110.721000] [<ffffffffad86fc6a>] ? free_init_pages+0x15a/0x1b0 [ 110.721000] [<ffffffffae579537>] alternative_instructions+0xc3/0xca [ 110.721000] [<ffffffffae57b0cb>] check_bugs+0x25f/0x2b6 [ 110.721000] [<ffffffffae56c19d>] start_kernel+0x422/0x46c [ 110.721000] [<ffffffffae56bb7b>] ? repair_env_string+0x5c/0x5c [ 110.721000] [<ffffffffae56b120>] ? early_idt_handler_array+0x120/0x120 [ 110.721000] [<ffffffffae56b72f>] x86_64_start_reservati...
2011 Apr 14
3
Debian Squeeze hangs with kernel 2.6.32-5-xen-686
...04000] [<c1037799>] ? warn_slowpath_common+0x5e/0x8a [ 0.004000] [<c10377cf>] ? warn_slowpath_null+0xa/0xc [ 0.004000] [<c1011cdc>] ? perf_events_lapic_init+0x28/0x29 [ 0.004000] [<c14073d9>] ? init_hw_perf_events+0x2dd/0x376 [ 0.004000] [<c140702c>] ? check_bugs+0x8/0xd8 [ 0.004000] [<c13ff808>] ? start_kernel+0x309/0x31d [ 0.004000] [<c1401410>] ? xen_start_kernel+0x564/0x56b [ 0.004000] [<c1409046>] ? mtrr_cleanup+0x341/0x3eb [ 0.004000] ---[ end trace a7919e7f17c0a725 ]--- [ 0.004000] ... version: 0 [...
2011 Jan 19
1
[BUG] Problem Booting Xen 4.0.1 on 2.6.32.26/27
...i [ 0.005879] Modules linked in: [ 0.005885] Pid: 0, comm: swapper Not tainted 2.6.32.26 #7 [ 0.005890] Call Trace: [ 0.005898] [] ? warn_slowpath_common+0x76/0x8c [ 0.005905] [] ? init_hw_perf_events+0x337/0x3d7 [ 0.005912] [] ? identify_boot_cpu+0x15/0x3d [ 0.005918] [] ? check_bugs+0x9/0x2e [ 0.005924] [] ? start_kernel+0x3cb/0x3e5 [ 0.005931] [] ? xen_start_kernel+0x5a4/0x5a8 [ 0.005941] ---[ end trace a7919e7f17c0a725 ]--- [ 0.005946] ... version: 0 [ 0.005950] ... bit width: 48 [ 0.005953] ... generic registers: 4 [ 0...