* Re: x86: add io_apic_ops to allow interception.Unsigned long ioapic_phys, idx = FIX_IO_APIC_BASE_0 +static void _init _ioapic_init_mappings(void) Struct io_apic _iomem *io_apic = -4141,6 +4180,11 static struct resource * _init ioapic_setup_resources(void) +static void _io_apic_modify(unsigned int apic, unsigned int reg, static inline void io_apic_modify(unsigned int apic, unsigned int reg, unsigned int value) * Older SiS APIC requires we rewrite the index register Writel(reg, -425,7 +463,8 static inline void io_apic_write(unsigned int apic, unsigned int reg, unsigned i +static void _io_apic_write(unsigned int apic, unsigned int reg, static inline void io_apic_write(unsigned int apic, unsigned int reg, unsigned int value) Struct io_apic _iomem *io_apic = io_apic_base(apic) +static unsigned int _io_apic_read(unsigned int apic, unsigned int reg) static inline unsigned int io_apic_read(unsigned int apic, unsigned int reg) Xen dom0 needs to paravirtualize IO operations to the IO APIC, so addĪ io_apic_ops for it to intercept. ` (15 subsequent siblings) 17 siblings, 1 reply 108+ messages in thread 23:25 ` xen: implement io_apic_ops Jeremy Fitzhardinge 23:25 ` xen/dom0: handle acpi lapic parsing in Xen dom0 Jeremy 23:25 ` Jeremy Fitzhardinge 23:25 Xen APIC hooks (with io_apic_ops) Jeremy Fitzhardinge * x86: add io_apic_ops to allow interception.Set_fixmap_nocache(FIX_APIC_BASE, address) + /* Xen dom0 doesn't have usable lapics */ Static void _init acpi_register_lapic_address(unsigned long address) If (!enabled) -802,6 +808,10 static int _init acpi_parse_fadt(struct acpi_table_header *table) + /* We don't want to register lapics when in Xen dom0 */ U32 -218,6 +220,10 static void _cpuinit acpi_register_lapic(int id, u8 enabled) This is very Xen-specific behaviour, so there didn't seem toĪrch/x86/kernel/acpi/boot.c | 10 ++++++++++ġ files changed, 10 insertions(+), 0 deletions(-)ĭiff -git a/arch/x86/kernel/acpi/boot.c b/arch/x86/kernel/acpi/boot.c Put a couple of tests for Xen to prevent lapics from being mapped orĪccessed. When running in Xen dom0, we still want to parse the ACPI tables toįind out about local and IO apics, but we don't want to actually use ` (16 subsequent siblings) 17 siblings, 0 replies 108+ messages in threadĬc: the arch/x86 maintainers, Linux Kernel Mailing List, Xen-devel, 23:25 ` x86: add io_apic_ops to allow interception Jeremy Fitzhardinge 23:25 Xen APIC hooks (with io_apic_ops) Jeremy 23:25 ` Jeremy Fitzhardinge * xen/dom0: handle acpi lapic parsing in Xen dom0.Xen: use acpi_get_override_irq() to get triggering for legacy irqs Xen: don't setup acpi interrupt unless there is one Xen: bind pirq to vector and event channel
#App4over critical ops hack registration#
Xen: direct irq registration to pirq event channels X86: add io_apic_ops to allow interception Xen/dom0: handle acpi lapic parsing in Xen dom0 Xen: fix legacy irq setup, make ioapic-less machines work. Git:///pub/scm/linux/kernel/git/jeremy/xen.git for-ingo/xen/dom0/apic-ops Xen/i386: make sure initial VGA/ISA mappings are not overridden The following changes since commit ce791368bb4a53d05e78e1588bac0aacde8db84c: To allow Xen to intercept IO APIC access operations. Here's a revised set of the Xen APIC changes which adds io_apic_ops ` (17 more replies) 0 siblings, 18 replies 108+ messages in threadįrom: Jeremy Fitzhardinge 23:25 UTC ( / raw)Ĭc: the arch/x86 maintainers, Linux Kernel Mailing List, Xen-devel 23:25 ` xen/dom0: handle acpi lapic parsing in Xen dom0 Jeremy Fitzhardinge
#App4over critical ops hack archive#
Xen APIC hooks (with io_apic_ops) LKML Archive on help / color / mirror / Atom feed * Xen APIC hooks (with io_apic_ops) 23:25 Jeremy Fitzhardinge