|
|
|
|
|
|
|
|
|
|
xen-bugs
[Xen-bugs] [Bug 167] x86 - Oops - Unable to handle kernel NULL pointer d
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=167
------- Additional Comments From ian.pratt@xxxxxxxxxxxx 2005-08-16 16:31
-------
Did this use to work 100% reliably before?
You might want to try reverting the following patch.
Thanks,
Ian
changeset: 6175:4ec947baae75285fcc7426b3ea618ae764c816e0
manifest: 6170:4fe8526ed5acf621084cf65a22444f17b350b8a3
user: akw27@xxxxxxxxxxxxxxxxxxxxxx
date: Mon Aug 15 14:16:04 2005
files: linux-2.6-xen-sparse/arch/xen/i386/mm/ioremap.c linux-2.6-xen-
sparse/arch/xen/x86_64/mm/ioremap.c linux-2.6-xen-sparse/drivers/xen/privcmd/
privcmd.c linux-2.6-xen-sparse/include/asm-xen/asm-i386/pgtable.h linux-2.6-xen-
sparse/include/asm-xen/asm-x86_64/pgtable.h linux-2.6-xen-sparse/include/linux/
mm.h linux-2.6-xen-sparse/mm/memory.c
description:
Add generic_page_range() -- generic page table operation.
Linux has several instances of repeated code to do updates to a range
of PTEs. Mapping memory between domains in Xen also tends to need to
do this quite frequently, to ensure page tables have been constructed
and to look up PTE addresses when making mapping-related hypercalls.
This patch adds a generic PTE walk-and-fill operation that takes a
function pointer to call on leaf entries. direct_remap_area_pages()
is updated to use the new call, ass are abuses of
__direct_remap_area_pages.
This patch also introduces two new helper functions for working with
page tables when mapping memory between domains:
create_lookup_pte_addr() returns the machine address of a PTE,
allocating intermediate page tables as necessary. touch_pte_range()
ensures that page tables exist for a virtual address range.
Many of the existing linux page table operations (e.g. zap/remap/etc)
could be modified to use this interface, which would potentially
shorten up mm/memory.c a bit.
--
Configure bugmail:
http://bugzilla.xensource.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
_______________________________________________
Xen-bugs mailing list
Xen-bugs@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-bugs
|
<Prev in Thread] |
Current Thread |
[Next in Thread>
|
- [Xen-bugs] [Bug 167] x86 - Oops - Unable to handle kernel NULL pointer dereference at virtual address 0000001c,
bugzilla-daemon <=
|
|
|
|
|