Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Backport v3.5-branch] drivers: virtualization: Map ivshmem-v2 sections individually #65812

Merged
merged 2 commits into from
Dec 4, 2023

Conversation

zephyrbot
Copy link
Collaborator

@zephyrbot zephyrbot commented Nov 27, 2023

Backport 82644a3~2..82644a3 from #65095.

Fixes: #65894

Recent changes to the arm64 MMU code mean that you can no longer map
R/O memory as R/W. Mapping R/W memory now causes a cache invalidation
instruction (DC IVAC) that requires write permissions or else a fault
is generated.

Modify ivshmem-v2 to map each R/O and R/W section individually

Signed-off-by: Grant Ramsay <[email protected]>
(cherry picked from commit 64cc076)
This driver assumed the ivshmem-v2 output sections would be mapped
contiguously, which is no longer true.

Modify eth_ivshmem to treat each output section independently

Signed-off-by: Grant Ramsay <[email protected]>
(cherry picked from commit 82644a3)
@henrikbrixandersen
Copy link
Member

@gramsay0 This needs a bug report in order to be backported.

@gramsay0
Copy link
Contributor

@gramsay0 This needs a bug report in order to be backported.

@henrikbrixandersen sorry about that.

I have created a ticket: #65894

@jhedberg jhedberg merged commit 2d8508b into v3.5-branch Dec 4, 2023
23 of 24 checks passed
@nashif nashif deleted the backport-65095-to-v3.5-branch branch February 13, 2024 14:50
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area: Ethernet area: Virtualization Backport Backport PR and backport failure issues
Projects
Status: Done
Development

Successfully merging this pull request may close these issues.

[Backport v3.5] drivers: virtualization: Crash when using ivshmem-v2
6 participants