Displaying 20 results from an estimated 37 matches for "vm_io".
2011 Sep 11
1
Xen PCI Pass-through: 0xbf701000 is using VM_IO, but it is 0xfffffffffffff000!
...Enhanced'' Host Controller (EHCI) Driver
[ 0.704816] ehci_hcd 0000:00:00.7: enabling device (0000 -> 0002)
[ 0.705842] ehci_hcd 0000:00:00.7: Xen PCI mapped GSI18 to IRQ28
[ 0.705951] ------------[ cut here ]------------
pte_debug+0x154/0x160()
[ 0.706099] 0xbf700000 is using VM_IO, but it is 0xfffffffffffff000!
[ 0.706155] Modules linked in:
[ 0.706251] Pid: 1, comm: swapper Not tainted 3.1.0-rc5+ #6
[ 0.706294] Call Trace:
[ 0.706356] [<ffffffff81063baf>] warn_slowpath_common+0x7f/0xc0
[ 0.706418] [<ffffffff81063ca6>] warn_slowpath_fmt+0x46/0x50...
2009 Aug 03
13
kernel BUG at arch/x86/xen/multicalls.c:103!
Hi,
I have this bug when I activate java-6-jdk on Tomcat 5.5.26 in a Lenny Guest :
Jul 31 21:24:15 tomcat01 kernel: 1 multicall(s) failed: cpu 3
Jul 31 21:24:15 tomcat01 kernel: call 1/1: op=14 arg=[b7f1a000] result=-22
Jul 31 21:24:15 tomcat01 kernel: ------------[ cut here ]------------
Jul 31 21:24:15 tomcat01 kernel: kernel BUG at arch/x86/xen/multicalls.c:103!
Jul 31 21:24:15 tomcat01
2010 Mar 10
34
[Patch RFC] nouveau accelerated on Xen pv-ops kernel
...c
--- nouveau-kernel.orig/drivers/gpu/drm/ttm/ttm_bo_vm.c 2010-01-27
10:19:28.000000000 +0530
+++ nouveau-kernel.new/drivers/gpu/drm/ttm/ttm_bo_vm.c 2010-03-10
17:28:59.000000000 +0530
@@ -271,7 +271,10 @@
*/
vma->vm_private_data = bo;
- vma->vm_flags |= VM_RESERVED | VM_IO | VM_MIXEDMAP | VM_DONTEXPAND;
+ vma->vm_flags |= VM_RESERVED | VM_MIXEDMAP | VM_DONTEXPAND;
+ if (!((bo->mem.placement & TTM_PL_MASK_MEM) & TTM_PL_FLAG_TT))
+ vma->vm_flags |= VM_IO;
+ vma->vm_page_prot = vma_get_vm_prot(vma->vm_flags);...
2010 Mar 10
34
[Patch RFC] nouveau accelerated on Xen pv-ops kernel
...c
--- nouveau-kernel.orig/drivers/gpu/drm/ttm/ttm_bo_vm.c 2010-01-27
10:19:28.000000000 +0530
+++ nouveau-kernel.new/drivers/gpu/drm/ttm/ttm_bo_vm.c 2010-03-10
17:28:59.000000000 +0530
@@ -271,7 +271,10 @@
*/
vma->vm_private_data = bo;
- vma->vm_flags |= VM_RESERVED | VM_IO | VM_MIXEDMAP | VM_DONTEXPAND;
+ vma->vm_flags |= VM_RESERVED | VM_MIXEDMAP | VM_DONTEXPAND;
+ if (!((bo->mem.placement & TTM_PL_MASK_MEM) & TTM_PL_FLAG_TT))
+ vma->vm_flags |= VM_IO;
+ vma->vm_page_prot = vma_get_vm_prot(vma->vm_flags);...
2010 Aug 06
7
[GIT PULL] devel/pat + devel/kms.fixes-0.5
...is neccessary for the drivers/gpu/drm/radeon driver to work
properly with AGP based cards (which look to be the only ones that
try to set WC on pages).
Also please pull from devel/kms.fixes-05 (based off your xen/dom0/agp)
which has the following patches:
Daniel De Graaf (1):
fb: propagate VM_IO to VMA.
Konrad Rzeszutek Wilk (10):
ttm: When TTM_PAGE_FLAG_DMA32 allocate pages under 4GB under Xen.
ttm: Set VM_IO only on pages with TTM_MEMTYPE_FLAG_NEEDS_IOREMAP set.
agp: Use Xen back-door to get bus address for legacy code.
agp: Program the GART with the real physica...
2006 Feb 08
3
[PATCH] direct_remap_pfn_range vm_flags fix
...-xen-sparse/arch/i386/mm/ioremap-xen.c
--- a/linux-2.6-xen-sparse/arch/i386/mm/ioremap-xen.c Tue Feb 7 20:46:13 2006
+++ b/linux-2.6-xen-sparse/arch/i386/mm/ioremap-xen.c Tue Feb 7 23:46:21 2006
@@ -120,7 +120,7 @@
domid_t domid)
{
/* Same as remap_pfn_range(). */
- vma->vm_flags |= VM_IO | VM_RESERVED;
+ vma->vm_flags |= VM_IO | VM_RESERVED | VM_PFNMAP;
return __direct_remap_pfn_range(
vma->vm_mm, address, mfn, size, prot, domid);
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2019 Jul 26
0
[PATCH v2 5/7] mm/hmm: make full use of walk_page_range()
...walk->vma;
+
+ /* If range is no longer valid, force retry. */
+ if (!range->valid)
+ return -EBUSY;
+
+ /*
+ * Skip vma ranges that don't have struct page backing them or
+ * map I/O devices directly.
+ * TODO: handle peer-to-peer device mappings.
+ */
+ if (vma->vm_flags & (VM_IO | VM_PFNMAP | VM_MIXEDMAP))
+ return -EFAULT;
+
+ if (is_vm_hugetlb_page(vma)) {
+ if (huge_page_shift(hstate_vma(vma)) != range->page_shift &&
+ range->page_shift != PAGE_SHIFT)
+ return -EINVAL;
+ } else {
+ if (range->page_shift != PAGE_SHIFT)
+ return -EINVAL;
+ }
+...
2019 Sep 11
0
[PATCH 1/4] mm/hmm: make full use of walk_page_range()
...a_walk->range;
+ struct vm_area_struct *vma = walk->vma;
+
+ /* If range is no longer valid, force retry. */
+ if (!range->valid)
+ return -EBUSY;
+
+ /*
+ * Skip vma ranges that don't have struct page backing them or
+ * map I/O devices directly.
+ */
+ if (vma->vm_flags & (VM_IO | VM_PFNMAP | VM_MIXEDMAP))
+ return -EFAULT;
+
+ /*
+ * If the vma does not allow read access, then assume that it does not
+ * allow write access either. HMM does not support architectures
+ * that allow write without read.
+ */
+ if (!(vma->vm_flags & VM_READ)) {
+ (void) hmm_pfns_f...
2020 Jun 03
2
[PATCH 4/6] vhost_vdpa: support doorbell mapping via mmap
...gt; Well
>
> int remap_pfn_range(struct vm_area_struct *vma, unsigned long addr,
> unsigned long pfn, unsigned long size, pgprot_t prot)
> {
> if (addr != (pfn << PAGE_SHIFT))
> return -EINVAL;
>
> vma->vm_flags |= VM_IO | VM_PFNMAP | VM_DONTEXPAND | VM_DONTDUMP;
> return 0;
> }
> EXPORT_SYMBOL(remap_pfn_range);
>
>
> So things aren't going to work if you have a fixed PFN
> which is the case of the hardware device.
Looking at the implementation of some drivers e.g mtd_char. If I...
2020 Jun 03
2
[PATCH 4/6] vhost_vdpa: support doorbell mapping via mmap
...gt; Well
>
> int remap_pfn_range(struct vm_area_struct *vma, unsigned long addr,
> unsigned long pfn, unsigned long size, pgprot_t prot)
> {
> if (addr != (pfn << PAGE_SHIFT))
> return -EINVAL;
>
> vma->vm_flags |= VM_IO | VM_PFNMAP | VM_DONTEXPAND | VM_DONTDUMP;
> return 0;
> }
> EXPORT_SYMBOL(remap_pfn_range);
>
>
> So things aren't going to work if you have a fixed PFN
> which is the case of the hardware device.
Looking at the implementation of some drivers e.g mtd_char. If I...
2019 Jul 26
13
[PATCH v2 0/7] mm/hmm: more HMM clean up
Here are seven more patches for things I found to clean up.
This was based on top of Christoph's seven patches:
"hmm_range_fault related fixes and legacy API removal v3".
I assume this will go into Jason's tree since there will likely be
more HMM changes in this cycle.
Changes from v1 to v2:
Added AMD GPU to hmm_update removal.
Added 2 patches from Christoph.
Added 2 patches as
2020 Jun 02
2
[PATCH 4/6] vhost_vdpa: support doorbell mapping via mmap
On 2020/6/2 ??12:56, Michael S. Tsirkin wrote:
> On Tue, Jun 02, 2020 at 03:22:49AM +0800, kbuild test robot wrote:
>> Hi Jason,
>>
>> I love your patch! Yet something to improve:
>>
>> [auto build test ERROR on vhost/linux-next]
>> [also build test ERROR on linus/master v5.7 next-20200529]
>> [if your patch is applied to the wrong git tree, please drop
2020 Jun 02
2
[PATCH 4/6] vhost_vdpa: support doorbell mapping via mmap
On 2020/6/2 ??12:56, Michael S. Tsirkin wrote:
> On Tue, Jun 02, 2020 at 03:22:49AM +0800, kbuild test robot wrote:
>> Hi Jason,
>>
>> I love your patch! Yet something to improve:
>>
>> [auto build test ERROR on vhost/linux-next]
>> [also build test ERROR on linus/master v5.7 next-20200529]
>> [if your patch is applied to the wrong git tree, please drop
2011 Nov 13
8
ioperm problem
Hi,
I''m trying to port AMD VGA passthru patch to the latest XEN and vanila kernel
and I got SIGSEGV in
static void ati_hw_out(uint16_t hport, uint32_t data)
{
ioperm(gfx_info.host_pio_base, gfx_info.pio_size, 1);
asm volatile ("out %1, %0"::"Nd"(hport),"a"(data));
ioperm(gfx_info.host_pio_base, gfx_info.pio_size, 0);
}
I tried old 2.6.32
2019 Sep 17
0
[PATCH 2/8] drm/shmem: switch shmem helper to &drm_gem_object_funcs.mmap
...> > - /* VM_PFNMAP was set by drm_gem_mmap() */
> > - vma->vm_flags &= ~VM_PFNMAP;
> > - vma->vm_flags |= VM_MIXEDMAP;
> > + vma->vm_flags |= (VM_MIXEDMAP|VM_DONTEXPAND);
>
> I'm finding this a bit hard to follow - but I think here we've lost
> VM_IO and VM_DONTDUMP which used to be set by drm_gem_mmap().
Yep. Intentional, but I think I better split that off to a separate
patch with a commit message explaining things.
> Also it looks like nothing is fiddling vma->vm_page_prot anymore.
Oops, that one was not intentional. Will fix.
ch...
2011 Jan 23
1
dom0 nouvueau on 2.6.37 invokes OOM killer
hi,
With XEN enabled in mainline kernel 2.6.37 configured for nouveau,
X failed with familiar symptoms. Found drm-tree did not have the
TTM_MEMTYPE_FLAG_NEEDS_IOREMAP or the drm_scatter patches.
Applied these patches (generated from my working 2.6.32.18 xen kernel
with 2.6.35.4 drm-tree backported) to the 2.6.37 mainline kernel.
Now starting X in dom0 invokes the OOM killer!
Bare boot works, as
2020 Jun 02
0
[PATCH 4/6] vhost_vdpa: support doorbell mapping via mmap
...it's worth to bother.
>
> Thanks
Well
int remap_pfn_range(struct vm_area_struct *vma, unsigned long addr,
unsigned long pfn, unsigned long size, pgprot_t prot)
{
if (addr != (pfn << PAGE_SHIFT))
return -EINVAL;
vma->vm_flags |= VM_IO | VM_PFNMAP | VM_DONTEXPAND | VM_DONTDUMP;
return 0;
}
EXPORT_SYMBOL(remap_pfn_range);
So things aren't going to work if you have a fixed PFN
which is the case of the hardware device.
>
> >
> >
> >
2011 Oct 10
26
PCI passthrough stopped working, brainache!
Recently had passthrough of 2xPCI DVB-T cards and 1xPCIe DVB-S2 card working,
the last know config that was *certainly* working was
dom0
xen-4.1.1-3.fc16.x86_64
kernel-3.1.0-0.rc7.git0.0.fc16.x86_64
domU
kernel-3.1.0-0.rc8.git0.0.fc16.x86_64
Since then I''ve updated
xen-4.1.1-6.fc16.x86_64 on dom0
kernel-3.1.0-0.rc9.git0.0.fc16.x86_64 on dom0 and domU
and updated all other packages
2019 Nov 12
0
[PATCH v3 03/14] mm/hmm: allow hmm_range to be used with a mmu_interval_notifier or hmm_mirror
...range->notifier_seq);
+ return !range->valid;
+}
+
static const struct mm_walk_ops hmm_walk_ops = {
.pud_entry = hmm_vma_walk_pud,
.pmd_entry = hmm_vma_walk_pmd,
@@ -898,18 +906,23 @@ long hmm_range_fault(struct hmm_range *range, unsigned int flags)
const unsigned long device_vma = VM_IO | VM_PFNMAP | VM_MIXEDMAP;
unsigned long start = range->start, end;
struct hmm_vma_walk hmm_vma_walk;
- struct hmm *hmm = range->hmm;
+ struct mm_struct *mm;
struct vm_area_struct *vma;
int ret;
- lockdep_assert_held(&hmm->mmu_notifier.mm->mmap_sem);
+ if (range->notifi...
2020 Jun 03
0
[PATCH 4/6] vhost_vdpa: support doorbell mapping via mmap
...n_range(struct vm_area_struct *vma, unsigned long addr,
> > unsigned long pfn, unsigned long size, pgprot_t prot)
> > {
> > if (addr != (pfn << PAGE_SHIFT))
> > return -EINVAL;
> >
> > vma->vm_flags |= VM_IO | VM_PFNMAP | VM_DONTEXPAND | VM_DONTDUMP;
> > return 0;
> > }
> > EXPORT_SYMBOL(remap_pfn_range);
> >
> >
> > So things aren't going to work if you have a fixed PFN
> > which is the case of the hardware device.
>
>
> Looking at th...