Update the xen/next-2.6.37 patch and rebuild for rc4-git1
drop upstream xen-pcifront-fixes patch
This commit is contained in:
parent
9e46bf6efa
commit
85b5730b7e
|
@ -712,7 +712,7 @@ Patch12403: tty-open-hangup-race-fixup.patch
|
|||
Patch20000: xen.next-2.6.37.patch
|
||||
#Patch20001: xen.upstream.core.patch
|
||||
# git://git.kernel.org/pub/scm/linux/kernel/git/konrad/xen.git branches
|
||||
Patch20005: xen.pcifront.fixes.patch
|
||||
#Patch20005: xen.pcifront.fixes.patch
|
||||
# git://xenbits.xen.org/people/sstabellini/linux-pvhvm branches
|
||||
#Patch20010: xen.pvhvm.fixes.patch
|
||||
|
||||
|
@ -1314,7 +1314,7 @@ ApplyPatch tty-open-hangup-race-fixup.patch
|
|||
# Xen patches
|
||||
ApplyPatch xen.next-2.6.37.patch
|
||||
#ApplyPatch xen.upstream.core.patch
|
||||
ApplyPatch xen.pcifront.fixes.patch
|
||||
#ApplyPatch xen.pcifront.fixes.patch
|
||||
#ApplyPatch xen.pvhvm.fixes.patch
|
||||
|
||||
# END OF PATCH APPLICATIONS
|
||||
|
@ -1929,6 +1929,10 @@ fi
|
|||
# || ||
|
||||
|
||||
%changelog
|
||||
* Thu Dec 02 2010 Michael Young <m.a.young@durham.ac.uk>
|
||||
- Update the xen/next-2.6.37 patch and rebuild for rc4-git1
|
||||
- xen-pcifront-fixes patch is now upstream
|
||||
|
||||
* Wed Dec 01 2010 Kyle McMartin <kyle@redhat.com> 2.6.37-0.rc4.git1.1
|
||||
- Linux 2.6.37-rc4-git1
|
||||
- Pull in DRM fixes that are queued for -rc5 [3074adc8]
|
||||
|
|
File diff suppressed because it is too large
Load Diff
|
@ -1,116 +0,0 @@
|
|||
From 723ee043b152e4ed7d901fb791a513bc60bb9a9c Mon Sep 17 00:00:00 2001
|
||||
From: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
|
||||
Date: Tue, 16 Nov 2010 12:09:59 -0500
|
||||
Subject: [PATCH] xen: set IO permission early (before early_cpu_init())
|
||||
|
||||
This patch is based off "xen dom0: Set up basic IO permissions for dom0."
|
||||
by Juan Quintela <quintela@redhat.com>.
|
||||
|
||||
On AMD machines when we boot the kernel as Domain 0 we get this nasty:
|
||||
|
||||
mapping kernel into physical memory
|
||||
Xen: setup ISA identity maps
|
||||
about to get started...
|
||||
(XEN) traps.c:475:d0 Unhandled general protection fault fault/trap [#13] on VCPU 0 [ec=0000]
|
||||
(XEN) domain_crash_sync called from entry.S
|
||||
(XEN) Domain 0 (vcpu#0) crashed on cpu#0:
|
||||
(XEN) ----[ Xen-4.1-101116 x86_64 debug=y Not tainted ]----
|
||||
(XEN) CPU: 0
|
||||
(XEN) RIP: e033:[<ffffffff8130271b>]
|
||||
(XEN) RFLAGS: 0000000000000282 EM: 1 CONTEXT: pv guest
|
||||
(XEN) rax: 000000008000c068 rbx: ffffffff8186c680 rcx: 0000000000000068
|
||||
(XEN) rdx: 0000000000000cf8 rsi: 000000000000c000 rdi: 0000000000000000
|
||||
(XEN) rbp: ffffffff81801e98 rsp: ffffffff81801e50 r8: ffffffff81801eac
|
||||
(XEN) r9: ffffffff81801ea8 r10: ffffffff81801eb4 r11: 00000000ffffffff
|
||||
(XEN) r12: ffffffff8186c694 r13: ffffffff81801f90 r14: ffffffffffffffff
|
||||
(XEN) r15: 0000000000000000 cr0: 000000008005003b cr4: 00000000000006f0
|
||||
(XEN) cr3: 0000000221803000 cr2: 0000000000000000
|
||||
(XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: e02b cs: e033
|
||||
(XEN) Guest stack trace from rsp=ffffffff81801e50:
|
||||
|
||||
RIP points to read_pci_config() function.
|
||||
|
||||
The issue is that we don't set IO permissions for the Linux kernel early enough.
|
||||
|
||||
The call sequence used to be:
|
||||
|
||||
xen_start_kernel()
|
||||
x86_init.oem.arch_setup = xen_setup_arch;
|
||||
setup_arch:
|
||||
- early_cpu_init
|
||||
- early_init_amd
|
||||
- read_pci_config
|
||||
- x86_init.oem.arch_setup [ xen_arch_setup ]
|
||||
- set IO permissions.
|
||||
|
||||
We need to set the IO permissions earlier on, which this patch does.
|
||||
|
||||
Acked-by: Jeremy Fitzhardinge <jeremy.fitzhardinge@citrix.com>
|
||||
Signed-off-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
|
||||
---
|
||||
arch/x86/xen/enlighten.c | 12 +++++++++++-
|
||||
arch/x86/xen/setup.c | 8 --------
|
||||
2 files changed, 11 insertions(+), 9 deletions(-)
|
||||
|
||||
diff --git a/arch/x86/xen/enlighten.c b/arch/x86/xen/enlighten.c
|
||||
index 235c0f4..759b762 100644
|
||||
--- a/arch/x86/xen/enlighten.c
|
||||
+++ b/arch/x86/xen/enlighten.c
|
||||
@@ -1090,6 +1090,8 @@ static void __init xen_setup_stackprotector(void)
|
||||
/* First C function to be called on Xen boot */
|
||||
asmlinkage void __init xen_start_kernel(void)
|
||||
{
|
||||
+ struct physdev_set_iopl set_iopl;
|
||||
+ int rc;
|
||||
pgd_t *pgd;
|
||||
|
||||
if (!xen_start_info)
|
||||
@@ -1202,10 +1204,18 @@ asmlinkage void __init xen_start_kernel(void)
|
||||
#else
|
||||
pv_info.kernel_rpl = 0;
|
||||
#endif
|
||||
-
|
||||
/* set the limit of our address space */
|
||||
xen_reserve_top();
|
||||
|
||||
+ /* We used to do this in xen_arch_setup, but that is too late on AMD
|
||||
+ * were early_cpu_init (run before ->arch_setup()) calls early_amd_init
|
||||
+ * which pokes 0xcf8 port.
|
||||
+ */
|
||||
+ set_iopl.iopl = 1;
|
||||
+ rc = HYPERVISOR_physdev_op(PHYSDEVOP_set_iopl, &set_iopl);
|
||||
+ if (rc != 0)
|
||||
+ xen_raw_printk("physdev_op failed %d\n", rc);
|
||||
+
|
||||
#ifdef CONFIG_X86_32
|
||||
/* set up basic CPUID stuff */
|
||||
cpu_detect(&new_cpu_data);
|
||||
diff --git a/arch/x86/xen/setup.c b/arch/x86/xen/setup.c
|
||||
index 769c4b0..4abb1c3 100644
|
||||
--- a/arch/x86/xen/setup.c
|
||||
+++ b/arch/x86/xen/setup.c
|
||||
@@ -337,9 +337,6 @@ void __cpuinit xen_enable_syscall(void)
|
||||
|
||||
void __init xen_arch_setup(void)
|
||||
{
|
||||
- struct physdev_set_iopl set_iopl;
|
||||
- int rc;
|
||||
-
|
||||
xen_panic_handler_init();
|
||||
|
||||
HYPERVISOR_vm_assist(VMASST_CMD_enable, VMASST_TYPE_4gb_segments);
|
||||
@@ -356,11 +353,6 @@ void __init xen_arch_setup(void)
|
||||
xen_enable_sysenter();
|
||||
xen_enable_syscall();
|
||||
|
||||
- set_iopl.iopl = 1;
|
||||
- rc = HYPERVISOR_physdev_op(PHYSDEVOP_set_iopl, &set_iopl);
|
||||
- if (rc != 0)
|
||||
- printk(KERN_INFO "physdev_op failed %d\n", rc);
|
||||
-
|
||||
#ifdef CONFIG_ACPI
|
||||
if (!(xen_start_info->flags & SIF_INITDOMAIN)) {
|
||||
printk(KERN_INFO "ACPI in unprivileged domain disabled\n");
|
||||
--
|
||||
1.7.3.2
|
||||
|
Loading…
Reference in New Issue