]> xenbits.xensource.com Git - people/ssmith/netchannel2-pvops.git/commitdiff
Merge branch 'x86/mm-v2' into kmemcheck
authorIngo Molnar <mingo@elte.hu>
Sun, 8 Mar 2009 18:41:25 +0000 (19:41 +0100)
committerIngo Molnar <mingo@elte.hu>
Sun, 8 Mar 2009 18:41:25 +0000 (19:41 +0100)
Conflicts:
arch/x86/Kconfig
arch/x86/mm/init_32.c
arch/x86/mm/init_64.c

Semantic merge:
arch/x86/mm/init.c

Signed-off-by: Ingo Molnar <mingo@elte.hu>
15 files changed:
1  2 
MAINTAINERS
arch/x86/Kconfig
arch/x86/include/asm/pgtable.h
arch/x86/include/asm/pgtable_types.h
arch/x86/kernel/Makefile
arch/x86/kernel/process.c
arch/x86/kernel/traps.c
arch/x86/mm/Makefile
arch/x86/mm/init.c
arch/x86/mm/init_32.c
arch/x86/mm/init_64.c
arch/x86/mm/pgtable.c
include/linux/intel-iommu.h
init/main.c
mm/Makefile

diff --cc MAINTAINERS
Simple merge
index 8016877b963814338e714755bbcd4240a2d4cd93,31758378bcd2707f7dd2803ecd9a98d2d9a9a063..60c12825eebb4777a5096a88ed97734852f6bf0f
@@@ -40,7 -40,9 +40,10 @@@ config X8
        select HAVE_GENERIC_DMA_COHERENT if X86_32
        select HAVE_EFFICIENT_UNALIGNED_ACCESS
        select USER_STACKTRACE_SUPPORT
+       select HAVE_KERNEL_GZIP
+       select HAVE_KERNEL_BZIP2
+       select HAVE_KERNEL_LZMA
 +      select HAVE_ARCH_KMEMCHECK
  
  config ARCH_DEFCONFIG
        string
Simple merge
Simple merge
Simple merge
index 8110c32eeb094c5130bca655ac796b96ed2ed035,6afa5232dbb739f99c07ff0641cc265428db74eb..c80f6adcb05c1f1ee31a91e6b9afee2e9b0a3be3
@@@ -52,9 -55,195 +55,195 @@@ void arch_task_cache_init(void
          task_xstate_cachep =
                kmem_cache_create("task_xstate", xstate_size,
                                  __alignof__(union thread_xstate),
 -                                SLAB_PANIC, NULL);
 +                                SLAB_PANIC | SLAB_NOTRACK, NULL);
  }
  
+ /*
+  * Free current thread data structures etc..
+  */
+ void exit_thread(void)
+ {
+       struct task_struct *me = current;
+       struct thread_struct *t = &me->thread;
+       if (me->thread.io_bitmap_ptr) {
+               struct tss_struct *tss = &per_cpu(init_tss, get_cpu());
+               kfree(t->io_bitmap_ptr);
+               t->io_bitmap_ptr = NULL;
+               clear_thread_flag(TIF_IO_BITMAP);
+               /*
+                * Careful, clear this in the TSS too:
+                */
+               memset(tss->io_bitmap, 0xff, t->io_bitmap_max);
+               t->io_bitmap_max = 0;
+               put_cpu();
+       }
+       ds_exit_thread(current);
+ }
+ void flush_thread(void)
+ {
+       struct task_struct *tsk = current;
+ #ifdef CONFIG_X86_64
+       if (test_tsk_thread_flag(tsk, TIF_ABI_PENDING)) {
+               clear_tsk_thread_flag(tsk, TIF_ABI_PENDING);
+               if (test_tsk_thread_flag(tsk, TIF_IA32)) {
+                       clear_tsk_thread_flag(tsk, TIF_IA32);
+               } else {
+                       set_tsk_thread_flag(tsk, TIF_IA32);
+                       current_thread_info()->status |= TS_COMPAT;
+               }
+       }
+ #endif
+       clear_tsk_thread_flag(tsk, TIF_DEBUG);
+       tsk->thread.debugreg0 = 0;
+       tsk->thread.debugreg1 = 0;
+       tsk->thread.debugreg2 = 0;
+       tsk->thread.debugreg3 = 0;
+       tsk->thread.debugreg6 = 0;
+       tsk->thread.debugreg7 = 0;
+       memset(tsk->thread.tls_array, 0, sizeof(tsk->thread.tls_array));
+       /*
+        * Forget coprocessor state..
+        */
+       tsk->fpu_counter = 0;
+       clear_fpu(tsk);
+       clear_used_math();
+ }
+ static void hard_disable_TSC(void)
+ {
+       write_cr4(read_cr4() | X86_CR4_TSD);
+ }
+ void disable_TSC(void)
+ {
+       preempt_disable();
+       if (!test_and_set_thread_flag(TIF_NOTSC))
+               /*
+                * Must flip the CPU state synchronously with
+                * TIF_NOTSC in the current running context.
+                */
+               hard_disable_TSC();
+       preempt_enable();
+ }
+ static void hard_enable_TSC(void)
+ {
+       write_cr4(read_cr4() & ~X86_CR4_TSD);
+ }
+ static void enable_TSC(void)
+ {
+       preempt_disable();
+       if (test_and_clear_thread_flag(TIF_NOTSC))
+               /*
+                * Must flip the CPU state synchronously with
+                * TIF_NOTSC in the current running context.
+                */
+               hard_enable_TSC();
+       preempt_enable();
+ }
+ int get_tsc_mode(unsigned long adr)
+ {
+       unsigned int val;
+       if (test_thread_flag(TIF_NOTSC))
+               val = PR_TSC_SIGSEGV;
+       else
+               val = PR_TSC_ENABLE;
+       return put_user(val, (unsigned int __user *)adr);
+ }
+ int set_tsc_mode(unsigned int val)
+ {
+       if (val == PR_TSC_SIGSEGV)
+               disable_TSC();
+       else if (val == PR_TSC_ENABLE)
+               enable_TSC();
+       else
+               return -EINVAL;
+       return 0;
+ }
+ void __switch_to_xtra(struct task_struct *prev_p, struct task_struct *next_p,
+                     struct tss_struct *tss)
+ {
+       struct thread_struct *prev, *next;
+       prev = &prev_p->thread;
+       next = &next_p->thread;
+       if (test_tsk_thread_flag(next_p, TIF_DS_AREA_MSR) ||
+           test_tsk_thread_flag(prev_p, TIF_DS_AREA_MSR))
+               ds_switch_to(prev_p, next_p);
+       else if (next->debugctlmsr != prev->debugctlmsr)
+               update_debugctlmsr(next->debugctlmsr);
+       if (test_tsk_thread_flag(next_p, TIF_DEBUG)) {
+               set_debugreg(next->debugreg0, 0);
+               set_debugreg(next->debugreg1, 1);
+               set_debugreg(next->debugreg2, 2);
+               set_debugreg(next->debugreg3, 3);
+               /* no 4 and 5 */
+               set_debugreg(next->debugreg6, 6);
+               set_debugreg(next->debugreg7, 7);
+       }
+       if (test_tsk_thread_flag(prev_p, TIF_NOTSC) ^
+           test_tsk_thread_flag(next_p, TIF_NOTSC)) {
+               /* prev and next are different */
+               if (test_tsk_thread_flag(next_p, TIF_NOTSC))
+                       hard_disable_TSC();
+               else
+                       hard_enable_TSC();
+       }
+       if (test_tsk_thread_flag(next_p, TIF_IO_BITMAP)) {
+               /*
+                * Copy the relevant range of the IO bitmap.
+                * Normally this is 128 bytes or less:
+                */
+               memcpy(tss->io_bitmap, next->io_bitmap_ptr,
+                      max(prev->io_bitmap_max, next->io_bitmap_max));
+       } else if (test_tsk_thread_flag(prev_p, TIF_IO_BITMAP)) {
+               /*
+                * Clear any possible leftover bits:
+                */
+               memset(tss->io_bitmap, 0xff, prev->io_bitmap_max);
+       }
+ }
+ int sys_fork(struct pt_regs *regs)
+ {
+       return do_fork(SIGCHLD, regs->sp, regs, 0, NULL, NULL);
+ }
+ /*
+  * This is trivial, and on the face of it looks like it
+  * could equally well be done in user mode.
+  *
+  * Not so, for quite unobvious reasons - register pressure.
+  * In user mode vfork() cannot have a stack frame, and if
+  * done by calling the "clone()" system call directly, you
+  * do not have enough call-clobbered registers to hold all
+  * the information you need.
+  */
+ int sys_vfork(struct pt_regs *regs)
+ {
+       return do_fork(CLONE_VFORK | CLONE_VM | SIGCHLD, regs->sp, regs, 0,
+                      NULL, NULL);
+ }
  /*
   * Idle related variables and functions
   */
Simple merge
Simple merge
index 0000000000000000000000000000000000000000,15219e0d1243479790e6cd809b68489da41b17f1..a8d29336929c07b466127536c5a7429102c55594
mode 000000,100644..100644
--- /dev/null
@@@ -1,0 -1,393 +1,393 @@@
 -#ifdef CONFIG_DEBUG_PAGEALLOC
+ #include <linux/ioport.h>
+ #include <linux/swap.h>
+ #include <asm/cacheflush.h>
+ #include <asm/e820.h>
+ #include <asm/init.h>
+ #include <asm/page.h>
+ #include <asm/page_types.h>
+ #include <asm/sections.h>
+ #include <asm/system.h>
+ #include <asm/tlbflush.h>
+ unsigned long __initdata e820_table_start;
+ unsigned long __meminitdata e820_table_end;
+ unsigned long __meminitdata e820_table_top;
+ int after_bootmem;
+ int direct_gbpages
+ #ifdef CONFIG_DIRECT_GBPAGES
+                               = 1
+ #endif
+ ;
+ static void __init find_early_table_space(unsigned long end, int use_pse,
+                                         int use_gbpages)
+ {
+       unsigned long puds, pmds, ptes, tables, start;
+       puds = (end + PUD_SIZE - 1) >> PUD_SHIFT;
+       tables = roundup(puds * sizeof(pud_t), PAGE_SIZE);
+       if (use_gbpages) {
+               unsigned long extra;
+               extra = end - ((end>>PUD_SHIFT) << PUD_SHIFT);
+               pmds = (extra + PMD_SIZE - 1) >> PMD_SHIFT;
+       } else
+               pmds = (end + PMD_SIZE - 1) >> PMD_SHIFT;
+       tables += roundup(pmds * sizeof(pmd_t), PAGE_SIZE);
+       if (use_pse) {
+               unsigned long extra;
+               extra = end - ((end>>PMD_SHIFT) << PMD_SHIFT);
+ #ifdef CONFIG_X86_32
+               extra += PMD_SIZE;
+ #endif
+               ptes = (extra + PAGE_SIZE - 1) >> PAGE_SHIFT;
+       } else
+               ptes = (end + PAGE_SIZE - 1) >> PAGE_SHIFT;
+       tables += roundup(ptes * sizeof(pte_t), PAGE_SIZE);
+ #ifdef CONFIG_X86_32
+       /* for fixmap */
+       tables += roundup(__end_of_fixed_addresses * sizeof(pte_t), PAGE_SIZE);
+ #endif
+       /*
+        * RED-PEN putting page tables only on node 0 could
+        * cause a hotspot and fill up ZONE_DMA. The page tables
+        * need roughly 0.5KB per GB.
+        */
+ #ifdef CONFIG_X86_32
+       start = 0x7000;
+       e820_table_start = find_e820_area(start, max_pfn_mapped<<PAGE_SHIFT,
+                                       tables, PAGE_SIZE);
+ #else /* CONFIG_X86_64 */
+       start = 0x8000;
+       e820_table_start = find_e820_area(start, end, tables, PAGE_SIZE);
+ #endif
+       if (e820_table_start == -1UL)
+               panic("Cannot find space for the kernel page tables");
+       e820_table_start >>= PAGE_SHIFT;
+       e820_table_end = e820_table_start;
+       e820_table_top = e820_table_start + (tables >> PAGE_SHIFT);
+       printk(KERN_DEBUG "kernel direct mapping tables up to %lx @ %lx-%lx\n",
+               end, e820_table_start << PAGE_SHIFT, e820_table_top << PAGE_SHIFT);
+ }
+ struct map_range {
+       unsigned long start;
+       unsigned long end;
+       unsigned page_size_mask;
+ };
+ #ifdef CONFIG_X86_32
+ #define NR_RANGE_MR 3
+ #else /* CONFIG_X86_64 */
+ #define NR_RANGE_MR 5
+ #endif
+ static int save_mr(struct map_range *mr, int nr_range,
+                  unsigned long start_pfn, unsigned long end_pfn,
+                  unsigned long page_size_mask)
+ {
+       if (start_pfn < end_pfn) {
+               if (nr_range >= NR_RANGE_MR)
+                       panic("run out of range for init_memory_mapping\n");
+               mr[nr_range].start = start_pfn<<PAGE_SHIFT;
+               mr[nr_range].end   = end_pfn<<PAGE_SHIFT;
+               mr[nr_range].page_size_mask = page_size_mask;
+               nr_range++;
+       }
+       return nr_range;
+ }
+ #ifdef CONFIG_X86_64
+ static void __init init_gbpages(void)
+ {
+       if (direct_gbpages && cpu_has_gbpages)
+               printk(KERN_INFO "Using GB pages for direct mapping\n");
+       else
+               direct_gbpages = 0;
+ }
+ #else
+ static inline void init_gbpages(void)
+ {
+ }
+ #endif
+ /*
+  * Setup the direct mapping of the physical memory at PAGE_OFFSET.
+  * This runs before bootmem is initialized and gets pages directly from
+  * the physical memory. To access them they are temporarily mapped.
+  */
+ unsigned long __init_refok init_memory_mapping(unsigned long start,
+                                              unsigned long end)
+ {
+       unsigned long page_size_mask = 0;
+       unsigned long start_pfn, end_pfn;
+       unsigned long ret = 0;
+       unsigned long pos;
+       struct map_range mr[NR_RANGE_MR];
+       int nr_range, i;
+       int use_pse, use_gbpages;
+       printk(KERN_INFO "init_memory_mapping: %016lx-%016lx\n", start, end);
+       if (!after_bootmem)
+               init_gbpages();
++#if defined(CONFIG_DEBUG_PAGEALLOC) || defined(CONFIG_KMEMCHECK)
+       /*
+        * For CONFIG_DEBUG_PAGEALLOC, identity mapping will use small pages.
+        * This will simplify cpa(), which otherwise needs to support splitting
+        * large pages into small in interrupt context, etc.
+        */
+       use_pse = use_gbpages = 0;
+ #else
+       use_pse = cpu_has_pse;
+       use_gbpages = direct_gbpages;
+ #endif
+ #ifdef CONFIG_X86_32
+ #ifdef CONFIG_X86_PAE
+       set_nx();
+       if (nx_enabled)
+               printk(KERN_INFO "NX (Execute Disable) protection: active\n");
+ #endif
+       /* Enable PSE if available */
+       if (cpu_has_pse)
+               set_in_cr4(X86_CR4_PSE);
+       /* Enable PGE if available */
+       if (cpu_has_pge) {
+               set_in_cr4(X86_CR4_PGE);
+               __supported_pte_mask |= _PAGE_GLOBAL;
+       }
+ #endif
+       if (use_gbpages)
+               page_size_mask |= 1 << PG_LEVEL_1G;
+       if (use_pse)
+               page_size_mask |= 1 << PG_LEVEL_2M;
+       memset(mr, 0, sizeof(mr));
+       nr_range = 0;
+       /* head if not big page alignment ? */
+       start_pfn = start >> PAGE_SHIFT;
+       pos = start_pfn << PAGE_SHIFT;
+ #ifdef CONFIG_X86_32
+       /*
+        * Don't use a large page for the first 2/4MB of memory
+        * because there are often fixed size MTRRs in there
+        * and overlapping MTRRs into large pages can cause
+        * slowdowns.
+        */
+       if (pos == 0)
+               end_pfn = 1<<(PMD_SHIFT - PAGE_SHIFT);
+       else
+               end_pfn = ((pos + (PMD_SIZE - 1))>>PMD_SHIFT)
+                                << (PMD_SHIFT - PAGE_SHIFT);
+ #else /* CONFIG_X86_64 */
+       end_pfn = ((pos + (PMD_SIZE - 1)) >> PMD_SHIFT)
+                       << (PMD_SHIFT - PAGE_SHIFT);
+ #endif
+       if (end_pfn > (end >> PAGE_SHIFT))
+               end_pfn = end >> PAGE_SHIFT;
+       if (start_pfn < end_pfn) {
+               nr_range = save_mr(mr, nr_range, start_pfn, end_pfn, 0);
+               pos = end_pfn << PAGE_SHIFT;
+       }
+       /* big page (2M) range */
+       start_pfn = ((pos + (PMD_SIZE - 1))>>PMD_SHIFT)
+                        << (PMD_SHIFT - PAGE_SHIFT);
+ #ifdef CONFIG_X86_32
+       end_pfn = (end>>PMD_SHIFT) << (PMD_SHIFT - PAGE_SHIFT);
+ #else /* CONFIG_X86_64 */
+       end_pfn = ((pos + (PUD_SIZE - 1))>>PUD_SHIFT)
+                        << (PUD_SHIFT - PAGE_SHIFT);
+       if (end_pfn > ((end>>PMD_SHIFT)<<(PMD_SHIFT - PAGE_SHIFT)))
+               end_pfn = ((end>>PMD_SHIFT)<<(PMD_SHIFT - PAGE_SHIFT));
+ #endif
+       if (start_pfn < end_pfn) {
+               nr_range = save_mr(mr, nr_range, start_pfn, end_pfn,
+                               page_size_mask & (1<<PG_LEVEL_2M));
+               pos = end_pfn << PAGE_SHIFT;
+       }
+ #ifdef CONFIG_X86_64
+       /* big page (1G) range */
+       start_pfn = ((pos + (PUD_SIZE - 1))>>PUD_SHIFT)
+                        << (PUD_SHIFT - PAGE_SHIFT);
+       end_pfn = (end >> PUD_SHIFT) << (PUD_SHIFT - PAGE_SHIFT);
+       if (start_pfn < end_pfn) {
+               nr_range = save_mr(mr, nr_range, start_pfn, end_pfn,
+                               page_size_mask &
+                                ((1<<PG_LEVEL_2M)|(1<<PG_LEVEL_1G)));
+               pos = end_pfn << PAGE_SHIFT;
+       }
+       /* tail is not big page (1G) alignment */
+       start_pfn = ((pos + (PMD_SIZE - 1))>>PMD_SHIFT)
+                        << (PMD_SHIFT - PAGE_SHIFT);
+       end_pfn = (end >> PMD_SHIFT) << (PMD_SHIFT - PAGE_SHIFT);
+       if (start_pfn < end_pfn) {
+               nr_range = save_mr(mr, nr_range, start_pfn, end_pfn,
+                               page_size_mask & (1<<PG_LEVEL_2M));
+               pos = end_pfn << PAGE_SHIFT;
+       }
+ #endif
+       /* tail is not big page (2M) alignment */
+       start_pfn = pos>>PAGE_SHIFT;
+       end_pfn = end>>PAGE_SHIFT;
+       nr_range = save_mr(mr, nr_range, start_pfn, end_pfn, 0);
+       /* try to merge same page size and continuous */
+       for (i = 0; nr_range > 1 && i < nr_range - 1; i++) {
+               unsigned long old_start;
+               if (mr[i].end != mr[i+1].start ||
+                   mr[i].page_size_mask != mr[i+1].page_size_mask)
+                       continue;
+               /* move it */
+               old_start = mr[i].start;
+               memmove(&mr[i], &mr[i+1],
+                       (nr_range - 1 - i) * sizeof(struct map_range));
+               mr[i--].start = old_start;
+               nr_range--;
+       }
+       for (i = 0; i < nr_range; i++)
+               printk(KERN_DEBUG " %010lx - %010lx page %s\n",
+                               mr[i].start, mr[i].end,
+                       (mr[i].page_size_mask & (1<<PG_LEVEL_1G))?"1G":(
+                        (mr[i].page_size_mask & (1<<PG_LEVEL_2M))?"2M":"4k"));
+       /*
+        * Find space for the kernel direct mapping tables.
+        *
+        * Later we should allocate these tables in the local node of the
+        * memory mapped. Unfortunately this is done currently before the
+        * nodes are discovered.
+        */
+       if (!after_bootmem)
+               find_early_table_space(end, use_pse, use_gbpages);
+ #ifdef CONFIG_X86_32
+       for (i = 0; i < nr_range; i++)
+               kernel_physical_mapping_init(mr[i].start, mr[i].end,
+                                            mr[i].page_size_mask);
+       ret = end;
+ #else /* CONFIG_X86_64 */
+       for (i = 0; i < nr_range; i++)
+               ret = kernel_physical_mapping_init(mr[i].start, mr[i].end,
+                                                  mr[i].page_size_mask);
+ #endif
+ #ifdef CONFIG_X86_32
+       early_ioremap_page_table_range_init();
+       load_cr3(swapper_pg_dir);
+ #endif
+ #ifdef CONFIG_X86_64
+       if (!after_bootmem)
+               mmu_cr4_features = read_cr4();
+ #endif
+       __flush_tlb_all();
+       if (!after_bootmem && e820_table_end > e820_table_start)
+               reserve_early(e820_table_start << PAGE_SHIFT,
+                                e820_table_end << PAGE_SHIFT, "PGTABLE");
+       if (!after_bootmem)
+               early_memtest(start, end);
+       return ret >> PAGE_SHIFT;
+ }
+ /*
+  * devmem_is_allowed() checks to see if /dev/mem access to a certain address
+  * is valid. The argument is a physical page number.
+  *
+  *
+  * On x86, access has to be given to the first megabyte of ram because that area
+  * contains bios code and data regions used by X and dosemu and similar apps.
+  * Access has to be given to non-kernel-ram areas as well, these contain the PCI
+  * mmio resources as well as potential bios/acpi data regions.
+  */
+ int devmem_is_allowed(unsigned long pagenr)
+ {
+       if (pagenr <= 256)
+               return 1;
+       if (iomem_is_exclusive(pagenr << PAGE_SHIFT))
+               return 0;
+       if (!page_is_ram(pagenr))
+               return 1;
+       return 0;
+ }
+ void free_init_pages(char *what, unsigned long begin, unsigned long end)
+ {
+       unsigned long addr = begin;
+       if (addr >= end)
+               return;
+       /*
+        * If debugging page accesses then do not free this memory but
+        * mark them not present - any buggy init-section access will
+        * create a kernel page fault:
+        */
+ #ifdef CONFIG_DEBUG_PAGEALLOC
+       printk(KERN_INFO "debug: unmapping init memory %08lx..%08lx\n",
+               begin, PAGE_ALIGN(end));
+       set_memory_np(begin, (end - begin) >> PAGE_SHIFT);
+ #else
+       /*
+        * We just marked the kernel text read only above, now that
+        * we are going to free part of that, we need to make that
+        * writeable first.
+        */
+       set_memory_rw(begin, (end - begin) >> PAGE_SHIFT);
+       printk(KERN_INFO "Freeing %s: %luk freed\n", what, (end - begin) >> 10);
+       for (; addr < end; addr += PAGE_SIZE) {
+               ClearPageReserved(virt_to_page(addr));
+               init_page_count(virt_to_page(addr));
+               memset((void *)(addr & ~(PAGE_SIZE-1)),
+                       POISON_FREE_INITMEM, PAGE_SIZE);
+               free_page(addr);
+               totalram_pages++;
+       }
+ #endif
+ }
+ void free_initmem(void)
+ {
+       free_init_pages("unused kernel memory",
+                       (unsigned long)(&__init_begin),
+                       (unsigned long)(&__init_end));
+ }
+ #ifdef CONFIG_BLK_DEV_INITRD
+ void free_initrd_mem(unsigned long start, unsigned long end)
+ {
+       free_init_pages("initrd memory", start, end);
+ }
+ #endif
index 0972cfa051cb4ba79e45aa026bb4491e11553e46,db81e9a8556b3b0bba854aeba5740bd0cc039039..ccadfb1d3eb08f8a8c991ed245d8446fb4ae4ab4
@@@ -119,8 -113,8 +113,8 @@@ static pte_t * __init one_page_table_in
        if (!(pmd_val(*pmd) & _PAGE_PRESENT)) {
                pte_t *page_table = NULL;
  
-               if (after_init_bootmem) {
+               if (after_bootmem) {
 -#ifdef CONFIG_DEBUG_PAGEALLOC
 +#if defined(CONFIG_DEBUG_PAGEALLOC) || defined(CONFIG_KMEMCHECK)
                        page_table = (pte_t *) alloc_bootmem_pages(PAGE_SIZE);
  #endif
                        if (!page_table)
@@@ -1176,17 -1054,17 +1054,47 @@@ static noinline int do_test_wp_bit(void
  const int rodata_test_data = 0xC3;
  EXPORT_SYMBOL_GPL(rodata_test_data);
  
++static int kernel_set_to_readonly;
++
++void set_kernel_text_rw(void)
++{
++      unsigned long start = PFN_ALIGN(_text);
++      unsigned long size = PFN_ALIGN(_etext) - start;
++
++      if (!kernel_set_to_readonly)
++              return;
++
++      pr_debug("Set kernel text: %lx - %lx for read write\n",
++               start, start+size);
++
++      set_pages_rw(virt_to_page(start), size >> PAGE_SHIFT);
++}
++
++void set_kernel_text_ro(void)
++{
++      unsigned long start = PFN_ALIGN(_text);
++      unsigned long size = PFN_ALIGN(_etext) - start;
++
++      if (!kernel_set_to_readonly)
++              return;
++
++      pr_debug("Set kernel text: %lx - %lx for read only\n",
++               start, start+size);
++
++      set_pages_ro(virt_to_page(start), size >> PAGE_SHIFT);
++}
++
  void mark_rodata_ro(void)
  {
        unsigned long start = PFN_ALIGN(_text);
        unsigned long size = PFN_ALIGN(_etext) - start;
  
--#ifndef CONFIG_DYNAMIC_FTRACE
--      /* Dynamic tracing modifies the kernel text section */
        set_pages_ro(virt_to_page(start), size >> PAGE_SHIFT);
        printk(KERN_INFO "Write protecting the kernel text: %luk\n",
                size >> 10);
  
++      kernel_set_to_readonly = 1;
++
  #ifdef CONFIG_CPA_DEBUG
        printk(KERN_INFO "Testing CPA: Reverting %lx-%lx\n",
                start, start+size);
        printk(KERN_INFO "Testing CPA: write protecting again\n");
        set_pages_ro(virt_to_page(start), size>>PAGE_SHIFT);
  #endif
--#endif /* CONFIG_DYNAMIC_FTRACE */
  
        start += size;
        size = (unsigned long)__end_rodata - start;
index 3003b5f4b14e0ff66d7b437cdd64ee3927dbc844,54efa57d1c039b648d6eb77bef1878c10e9cdb0b..e127f2ec8c99d12aee9309b64eac71a274fb3714
@@@ -945,62 -730,25 +730,52 @@@ void __init mem_init(void
                initsize >> 10);
  }
  
- void free_init_pages(char *what, unsigned long begin, unsigned long end)
+ #ifdef CONFIG_DEBUG_RODATA
+ const int rodata_test_data = 0xC3;
+ EXPORT_SYMBOL_GPL(rodata_test_data);
++static int kernel_set_to_readonly;
++
++void set_kernel_text_rw(void)
 +{
-       unsigned long addr = begin;
++      unsigned long start = PFN_ALIGN(_stext);
++      unsigned long end = PFN_ALIGN(__start_rodata);
 +
-       if (addr >= end)
++      if (!kernel_set_to_readonly)
 +              return;
 +
-       /*
-        * If debugging page accesses then do not free this memory but
-        * mark them not present - any buggy init-section access will
-        * create a kernel page fault:
-        */
- #ifdef CONFIG_DEBUG_PAGEALLOC
-       printk(KERN_INFO "debug: unmapping init memory %08lx..%08lx\n",
-               begin, PAGE_ALIGN(end));
-       set_memory_np(begin, (end - begin) >> PAGE_SHIFT);
- #else
-       printk(KERN_INFO "Freeing %s: %luk freed\n", what, (end - begin) >> 10);
-       for (; addr < end; addr += PAGE_SIZE) {
-               ClearPageReserved(virt_to_page(addr));
-               init_page_count(virt_to_page(addr));
-               memset((void *)(addr & ~(PAGE_SIZE-1)),
-                       POISON_FREE_INITMEM, PAGE_SIZE);
-               free_page(addr);
-               totalram_pages++;
-       }
- #endif
++      pr_debug("Set kernel text: %lx - %lx for read write\n",
++               start, end);
++
++      set_memory_rw(start, (end - start) >> PAGE_SHIFT);
 +}
 +
- void free_initmem(void)
++void set_kernel_text_ro(void)
 +{
-       free_init_pages("unused kernel memory",
-                       (unsigned long)(&__init_begin),
-                       (unsigned long)(&__init_end));
- }
++      unsigned long start = PFN_ALIGN(_stext);
++      unsigned long end = PFN_ALIGN(__start_rodata);
 +
- #ifdef CONFIG_DEBUG_RODATA
- const int rodata_test_data = 0xC3;
- EXPORT_SYMBOL_GPL(rodata_test_data);
++      if (!kernel_set_to_readonly)
++              return;
++
++      pr_debug("Set kernel text: %lx - %lx for read only\n",
++               start, end);
++
++      set_memory_ro(start, (end - start) >> PAGE_SHIFT);
++}
 +
  void mark_rodata_ro(void)
  {
        unsigned long start = PFN_ALIGN(_stext), end = PFN_ALIGN(__end_rodata);
        unsigned long rodata_start =
                ((unsigned long)__start_rodata + PAGE_SIZE - 1) & PAGE_MASK;
  
--#ifdef CONFIG_DYNAMIC_FTRACE
--      /* Dynamic tracing modifies the kernel text section */
--      start = rodata_start;
--#endif
--
        printk(KERN_INFO "Write protecting the kernel read-only data: %luk\n",
               (end - start) >> 10);
        set_memory_ro(start, (end - start) >> PAGE_SHIFT);
  
++      kernel_set_to_readonly = 1;
++
        /*
         * The rodata section (but not the kernel text!) should also be
         * not-executable.
Simple merge
index 43412aeddb53360c2dd5bbbd5301783442153c60,d2e3cbfba14f45ea30b34bc78e36735c5db2755d..4d6a0a2c00b07c34ed1f41503596844f6e70e4d4
@@@ -328,6 -329,13 +329,6 @@@ extern int qi_flush_iotlb(struct intel_
                          unsigned int size_order, u64 type,
                          int non_present_entry_flush);
  
- extern void qi_submit_sync(struct qi_desc *desc, struct intel_iommu *iommu);
+ extern int qi_submit_sync(struct qi_desc *desc, struct intel_iommu *iommu);
  
 -extern void *intel_alloc_coherent(struct device *, size_t, dma_addr_t *, gfp_t);
 -extern void intel_free_coherent(struct device *, size_t, void *, dma_addr_t);
 -extern dma_addr_t intel_map_single(struct device *, phys_addr_t, size_t, int);
 -extern void intel_unmap_single(struct device *, dma_addr_t, size_t, int);
 -extern int intel_map_sg(struct device *, struct scatterlist *, int, int);
 -extern void intel_unmap_sg(struct device *, struct scatterlist *, int, int);
 -
  #endif
diff --cc init/main.c
Simple merge
diff --cc mm/Makefile
Simple merge