search for: set_fixmap

Displaying 20 results from an estimated 73 matches for "set_fixmap".

Did you mean: __set_fixmap
2007 Feb 14
2
[PATCH 8/8] 2.6.17: scan DMI early
...just-established permanent ones. */ @@ -739,6 +773,24 @@ void __meminit init_memory_mapping(unsig for (; start < end; start += PAGE_SIZE) WARN_ON(HYPERVISOR_update_va_mapping( start, __pte_ma(0), 0)); + + /* Switch to the real shared_info page, and clear the + * dummy page. */ + set_fixmap(FIX_SHARED_INFO, xen_start_info->shared_info); + HYPERVISOR_shared_info = (shared_info_t *)fix_to_virt(FIX_SHARED_INFO); + memset(empty_zero_page, 0, sizeof(empty_zero_page)); + + /* Setup mapping of lower 1st MB */ + for (next = 0; next < NR_FIX_ISAMAPS; next++) + if (is_initial_xendom...
2012 Sep 11
2
[PATCH RFC 5/8] ns16550: MMIO adjustments
On x86 ioremap() is not suitable here, set_fixmap() must be used instead. Also replace some literal numbers by their proper symbolic constants, making the code easier to understand. Signed-off-by: Jan Beulich <jbeulich@suse.com> --- a/xen/drivers/char/ns16550.c +++ b/xen/drivers/char/ns16550.c @@ -20,6 +20,9 @@ #include <xen/pci.h>...
2013 Nov 25
22
[PATCH v3 00/13] xen: arm initial support for xgene arm64 platform
George has release acked all of these. Otherwise mostly minor updates this time around. Summary: A == acked, M == modified A xen: arm64: Add 8250 earlyprintk support A xen: arm64: Add Basic Platform support for APM X-Gene Storm. A xen: arm64: Add APM implementor id to processor implementers. M xen: arm: add a quirk to handle platforms with unusual GIC layout A xen: arm: allow platform
2018 Feb 09
0
retpoline mitigation and 6.0
...;mp_register_ioapic+194>: movb   $0x1,-0x3e2cb1b9(%edi) 2: gsi_base = 0 3: *(int *)0xc1b2fe34 = 0 (gdb)  416 ioapics[idx].mp_config.apicaddr = address; 1: x/i $pc => 0xc1046a79 <mp_register_ioapic+201>: mov    %esi,-0x3e2cb1b8(%edi) 2: gsi_base = 0 3: *(int *)0xc1b2fe34 = 0 (gdb)  418 set_fixmap_nocache(FIX_IO_APIC_BASE_0 + idx, address); 1: x/i $pc => 0xc1046a7f <mp_register_ioapic+207>: lea    0x5(%ebx),%eax 2: gsi_base = 0 3: *(int *)0xc1b2fe34 = 0 (gdb)  cachemode2protval (pcm=_PAGE_CACHE_MODE_UC) at ./arch/x86/include/asm/pgtable_types.h:439 439 return __cachemode2pte_tbl[pc...
2005 Jul 13
2
Re: [Xen-changelog] Fix NX/XD enable on secondary CPUs.
...72) Non-priv domain attempted RDMSR(c0000080,00000000,20100000). (XEN) (file=traps.c, line=864) Non-priv domain attempted WRMSR(c0000080,00000800,00000000). ... and the kernel crashes shortly later, I guess due to NX pte entry without NX being enabled on CPU #1. It crashes right after the first set_fixmap call which creates a pte entry with NX set. Gerd -- panic("it works"); /* avoid being flooded with debug messages */ _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
2018 Feb 09
2
retpoline mitigation and 6.0
On Fri, 2018-02-09 at 10:36 +0000, David Woodhouse wrote: > > Did you get anywhere with the function attribute? Having isolated the > next boot failure to "it goes away if I compile io_apic.c without > retpoline", bisecting it per-function would help to further delay the > bit where I actually have to start *thinking*... It's mp_register_ioapic(), and only when
2005 May 24
28
Xen & Transmeta (from xen-users)
All- With suggestions from Ian and previous posts on this list, I''ve been investigating why Xen causes a Transmeta-based system to reboot immediately.. I''ve added instrumentation to xen/arch/x86/boot/x86_32.S (a collection of ''.asciz "foo"'' statements) hoping to locate a point of failure.. and it dies sometime before this code is run.. At what point
2018 Aug 10
0
[PATCH 04/10] x86/paravirt: use a single ops structure
...zeof(long)) /* 5 arg words */ - pv_mmu_ops.set_pte_at(mm, addr, ptep, pte); + pv_ops.pv_mmu_ops.set_pte_at(mm, addr, ptep, pte); else PVOP_VCALL4(pv_mmu_ops.set_pte_at, mm, addr, ptep, pte.pte); } @@ -663,7 +663,7 @@ static inline void arch_flush_lazy_mmu_mode(void) static inline void __set_fixmap(unsigned /* enum fixed_addresses */ idx, phys_addr_t phys, pgprot_t flags) { - pv_mmu_ops.set_fixmap(idx, phys, flags); + pv_ops.pv_mmu_ops.set_fixmap(idx, phys, flags); } #if defined(CONFIG_SMP) && defined(CONFIG_PARAVIRT_SPINLOCKS) @@ -694,6 +694,9 @@ static __always_inline bool...
2018 Feb 09
3
retpoline mitigation and 6.0
..._base = 0 > 3: *(int *)0xc1b2fe34 = 0 > (gdb) > 416 ioapics[idx].mp_config.apicaddr = address; > 1: x/i $pc > => 0xc1046a79 <mp_register_ioapic+201>: mov %esi,-0x3e2cb1b8(%edi) > 2: gsi_base = 0 > 3: *(int *)0xc1b2fe34 = 0 > (gdb) > 418 set_fixmap_nocache(FIX_IO_APIC_BASE_0 + idx, address); > 1: x/i $pc > => 0xc1046a7f <mp_register_ioapic+207>: lea 0x5(%ebx),%eax > 2: gsi_base = 0 > 3: *(int *)0xc1b2fe34 = 0 > (gdb) > cachemode2protval (pcm=_PAGE_CACHE_MODE_UC) at ./arch/x86/include/asm/ > pgtable_types.h:439...
2007 Nov 21
5
Next steps with pv_ops for Xen
Hi all, I've been looking at the next steps to try to get Xen running fully on top of pv_ops. To that end, I've (just) started looking at one of the next major jobs --- i686 dom0 on pv_ops. There are still a number of things needing done to reach parity with xen-unstable: x86_64 xen on pv_ops Paravirt framebuffer/keyboard CPU hotplug Balloon kexec driver domains but it
2007 Nov 21
5
Next steps with pv_ops for Xen
Hi all, I've been looking at the next steps to try to get Xen running fully on top of pv_ops. To that end, I've (just) started looking at one of the next major jobs --- i686 dom0 on pv_ops. There are still a number of things needing done to reach parity with xen-unstable: x86_64 xen on pv_ops Paravirt framebuffer/keyboard CPU hotplug Balloon kexec driver domains but it
2007 Nov 21
5
Next steps with pv_ops for Xen
Hi all, I've been looking at the next steps to try to get Xen running fully on top of pv_ops. To that end, I've (just) started looking at one of the next major jobs --- i686 dom0 on pv_ops. There are still a number of things needing done to reach parity with xen-unstable: x86_64 xen on pv_ops Paravirt framebuffer/keyboard CPU hotplug Balloon kexec driver domains but it
2007 Apr 30
2
[PATCH 0/12] Early USB debug port and i386 boot cleanups
...es primarily on memory mapped I/O which is typically at addresses that are not mapped by the kernels initial page tables, which makes using them currently unusable for early debugging print support. So this patch set digs in and fixes the early page tables on both arch/i386 and arch/x86_64 so that set_fixmap works with our initial boot page tables. All that is needed is that we allocate preallocate the pte page that the fixmap entries live on. On arch/i386 I accomplish this by ensuring the boot time page tables are in the native mode. Doing this provides an alternative and slightly more capable fix...
2007 Apr 30
2
[PATCH 0/12] Early USB debug port and i386 boot cleanups
...es primarily on memory mapped I/O which is typically at addresses that are not mapped by the kernels initial page tables, which makes using them currently unusable for early debugging print support. So this patch set digs in and fixes the early page tables on both arch/i386 and arch/x86_64 so that set_fixmap works with our initial boot page tables. All that is needed is that we allocate preallocate the pte page that the fixmap entries live on. On arch/i386 I accomplish this by ensuring the boot time page tables are in the native mode. Doing this provides an alternative and slightly more capable fix...
2005 Jul 13
2
RE: Re: [Xen-changelog] Fix NX/XD enable on secondary CPUs.
...(XEN) (file=traps.c, line=864) Non-priv domain attempted > > WRMSR(c0000080,00000800,00000000). > > > > ... and the kernel crashes shortly later, I guess due to NX > pte entry > > without NX being enabled on CPU #1. It crashes right after > the first > > set_fixmap call which creates a pte entry with NX set. > > > _______________________________________________ > Xen-devel mailing list > Xen-devel@lists.xensource.com > http://lists.xensource.com/xen-devel > _______________________________________________ Xen-devel mailing list Xen-de...
2013 Feb 24
2
[xen-4.2-testing test] 16260: regressions - FAIL
flight 16260 xen-4.2-testing real [real] http://www.chiark.greenend.org.uk/~xensrcts/logs/16260/ Regressions :-( Tests which did not succeed and are blocking, including tests which could not be run: test-i386-i386-xl 5 xen-boot fail REGR. vs. 16228 test-i386-i386-xl-qemuu-winxpsp3 5 xen-boot fail REGR. vs. 16228 test-i386-i386-win 5
2018 Aug 10
13
[PATCH 00/10] x86/paravirt: several cleanups
This series removes some no longer needed stuff from paravirt infrastructure and puts large quantities of paravirt ops under a new config option PARAVIRT_XXL which is selected by XEN_PV only. A pvops kernel without XEN_PV being configured is about 2.5% smaller with this series applied. tip commit 5800dc5c19f34e6e03b5adab1282535cb102fafd ("x86/paravirt: Fix spectre-v2 mitigations for
2009 Jan 29
0
[PATCH v2] txt: 2/5 - ACPI Generic Address Structure for tboot shutdown
...ate by this stub */ diff -r ecb74962f6f4 -r 9ba8aecc3a15 xen/arch/x86/tboot.c --- a/xen/arch/x86/tboot.c Wed Jan 28 21:56:22 2009 -0800 +++ b/xen/arch/x86/tboot.c Wed Jan 28 22:09:02 2009 -0800 @@ -30,23 +30,24 @@ void __init tboot_probe(void) /* Map and check for tboot UUID. */ set_fixmap(FIX_TBOOT_SHARED_BASE, p_tboot_shared); tboot_shared = (tboot_shared_t *)fix_to_virt(FIX_TBOOT_SHARED_BASE); + if ( tboot_shared == NULL ) + return; if ( memcmp(&tboot_shared_uuid, (uuid_t *)tboot_shared, sizeof(uuid_t)) ) return; + + /* new tboot_shared (w/ GAS...
2018 Aug 13
11
[PATCH v2 00/11] x86/paravirt: several cleanups
This series removes some no longer needed stuff from paravirt infrastructure and puts large quantities of paravirt ops under a new config option PARAVIRT_XXL which is selected by XEN_PV only. A pvops kernel without XEN_PV being configured is about 2.5% smaller with this series applied. tip commit 5800dc5c19f34e6e03b5adab1282535cb102fafd ("x86/paravirt: Fix spectre-v2 mitigations for
2007 Apr 18
1
[PATCH] Gerd Hoffman's move-vsyscall-into-user-address-range patch
...-45,23 +46,88 @@ void enable_sep_cpu(void) */ extern const char vsyscall_int80_start, vsyscall_int80_end; extern const char vsyscall_sysenter_start, vsyscall_sysenter_end; +static void *syscall_page; int __init sysenter_setup(void) { - void *page = (void *)get_zeroed_page(GFP_ATOMIC); - - __set_fixmap(FIX_VSYSCALL, __pa(page), PAGE_READONLY_EXEC); + syscall_page = (void *)get_zeroed_page(GFP_ATOMIC); if (!boot_cpu_has(X86_FEATURE_SEP)) { - memcpy(page, + memcpy(syscall_page, &vsyscall_int80_start, &vsyscall_int80_end - &vsyscall_int80_start); return 0;...