Home
last modified time | relevance | path

Searched hist:"380 e18ade4a51334e8806160e6f0fdfaca0b4428" (Results 1 – 4 of 4) sorted by relevance

/openbmc/linux/arch/arm64/kvm/hyp/nvhe/
H A Dhyp.lds.Sdiff 380e18ade4a51334e8806160e6f0fdfaca0b4428 Fri Mar 19 05:01:15 CDT 2021 Quentin Perret <qperret@google.com> KVM: arm64: Introduce a BSS section for use at Hyp

Currently, the hyp code cannot make full use of a bss, as the kernel
section is mapped read-only.

While this mapping could simply be changed to read-write, it would
intermingle even more the hyp and kernel state than they currently are.
Instead, introduce a __hyp_bss section, that uses reserved pages, and
create the appropriate RW hyp mappings during KVM init.

Acked-by: Will Deacon <will@kernel.org>
Signed-off-by: Quentin Perret <qperret@google.com>
Signed-off-by: Marc Zyngier <maz@kernel.org>
Link: https://lore.kernel.org/r/20210319100146.1149909-8-qperret@google.com
/openbmc/linux/arch/arm64/include/asm/
H A Dsections.hdiff 380e18ade4a51334e8806160e6f0fdfaca0b4428 Fri Mar 19 05:01:15 CDT 2021 Quentin Perret <qperret@google.com> KVM: arm64: Introduce a BSS section for use at Hyp

Currently, the hyp code cannot make full use of a bss, as the kernel
section is mapped read-only.

While this mapping could simply be changed to read-write, it would
intermingle even more the hyp and kernel state than they currently are.
Instead, introduce a __hyp_bss section, that uses reserved pages, and
create the appropriate RW hyp mappings during KVM init.

Acked-by: Will Deacon <will@kernel.org>
Signed-off-by: Quentin Perret <qperret@google.com>
Signed-off-by: Marc Zyngier <maz@kernel.org>
Link: https://lore.kernel.org/r/20210319100146.1149909-8-qperret@google.com
/openbmc/linux/arch/arm64/kvm/
H A Darm.cdiff 380e18ade4a51334e8806160e6f0fdfaca0b4428 Fri Mar 19 05:01:15 CDT 2021 Quentin Perret <qperret@google.com> KVM: arm64: Introduce a BSS section for use at Hyp

Currently, the hyp code cannot make full use of a bss, as the kernel
section is mapped read-only.

While this mapping could simply be changed to read-write, it would
intermingle even more the hyp and kernel state than they currently are.
Instead, introduce a __hyp_bss section, that uses reserved pages, and
create the appropriate RW hyp mappings during KVM init.

Acked-by: Will Deacon <will@kernel.org>
Signed-off-by: Quentin Perret <qperret@google.com>
Signed-off-by: Marc Zyngier <maz@kernel.org>
Link: https://lore.kernel.org/r/20210319100146.1149909-8-qperret@google.com
/openbmc/linux/arch/arm64/kernel/
H A Dvmlinux.lds.Sdiff 380e18ade4a51334e8806160e6f0fdfaca0b4428 Fri Mar 19 05:01:15 CDT 2021 Quentin Perret <qperret@google.com> KVM: arm64: Introduce a BSS section for use at Hyp

Currently, the hyp code cannot make full use of a bss, as the kernel
section is mapped read-only.

While this mapping could simply be changed to read-write, it would
intermingle even more the hyp and kernel state than they currently are.
Instead, introduce a __hyp_bss section, that uses reserved pages, and
create the appropriate RW hyp mappings during KVM init.

Acked-by: Will Deacon <will@kernel.org>
Signed-off-by: Quentin Perret <qperret@google.com>
Signed-off-by: Marc Zyngier <maz@kernel.org>
Link: https://lore.kernel.org/r/20210319100146.1149909-8-qperret@google.com