Searched hist:"380 e18ade4a51334e8806160e6f0fdfaca0b4428" (Results 1 – 4 of 4) sorted by relevance
/openbmc/linux/arch/arm64/kvm/hyp/nvhe/ |
H A D | hyp.lds.S | diff 380e18ade4a51334e8806160e6f0fdfaca0b4428 Fri Mar 19 05:01:15 CDT 2021 Quentin Perret <qperret@google.com> KVM: arm64: Introduce a BSS section for use at Hyp
Currently, the hyp code cannot make full use of a bss, as the kernel section is mapped read-only.
While this mapping could simply be changed to read-write, it would intermingle even more the hyp and kernel state than they currently are. Instead, introduce a __hyp_bss section, that uses reserved pages, and create the appropriate RW hyp mappings during KVM init.
Acked-by: Will Deacon <will@kernel.org> Signed-off-by: Quentin Perret <qperret@google.com> Signed-off-by: Marc Zyngier <maz@kernel.org> Link: https://lore.kernel.org/r/20210319100146.1149909-8-qperret@google.com
|
/openbmc/linux/arch/arm64/include/asm/ |
H A D | sections.h | diff 380e18ade4a51334e8806160e6f0fdfaca0b4428 Fri Mar 19 05:01:15 CDT 2021 Quentin Perret <qperret@google.com> KVM: arm64: Introduce a BSS section for use at Hyp
Currently, the hyp code cannot make full use of a bss, as the kernel section is mapped read-only.
While this mapping could simply be changed to read-write, it would intermingle even more the hyp and kernel state than they currently are. Instead, introduce a __hyp_bss section, that uses reserved pages, and create the appropriate RW hyp mappings during KVM init.
Acked-by: Will Deacon <will@kernel.org> Signed-off-by: Quentin Perret <qperret@google.com> Signed-off-by: Marc Zyngier <maz@kernel.org> Link: https://lore.kernel.org/r/20210319100146.1149909-8-qperret@google.com
|
/openbmc/linux/arch/arm64/kvm/ |
H A D | arm.c | diff 380e18ade4a51334e8806160e6f0fdfaca0b4428 Fri Mar 19 05:01:15 CDT 2021 Quentin Perret <qperret@google.com> KVM: arm64: Introduce a BSS section for use at Hyp
Currently, the hyp code cannot make full use of a bss, as the kernel section is mapped read-only.
While this mapping could simply be changed to read-write, it would intermingle even more the hyp and kernel state than they currently are. Instead, introduce a __hyp_bss section, that uses reserved pages, and create the appropriate RW hyp mappings during KVM init.
Acked-by: Will Deacon <will@kernel.org> Signed-off-by: Quentin Perret <qperret@google.com> Signed-off-by: Marc Zyngier <maz@kernel.org> Link: https://lore.kernel.org/r/20210319100146.1149909-8-qperret@google.com
|
/openbmc/linux/arch/arm64/kernel/ |
H A D | vmlinux.lds.S | diff 380e18ade4a51334e8806160e6f0fdfaca0b4428 Fri Mar 19 05:01:15 CDT 2021 Quentin Perret <qperret@google.com> KVM: arm64: Introduce a BSS section for use at Hyp
Currently, the hyp code cannot make full use of a bss, as the kernel section is mapped read-only.
While this mapping could simply be changed to read-write, it would intermingle even more the hyp and kernel state than they currently are. Instead, introduce a __hyp_bss section, that uses reserved pages, and create the appropriate RW hyp mappings during KVM init.
Acked-by: Will Deacon <will@kernel.org> Signed-off-by: Quentin Perret <qperret@google.com> Signed-off-by: Marc Zyngier <maz@kernel.org> Link: https://lore.kernel.org/r/20210319100146.1149909-8-qperret@google.com
|