Displaying 6 results from an estimated 6 matches for "print_bad_pt".
Did you mean:
print_bad_pte
2013 Dec 04
5
[PATCH] arm: xen: foreign mapping PTEs are special.
These mappings are in fact special and require special handling in privcmd,
which already exists. Failure to mark the PTE as special on arm64 causes all sorts of bad PTE fun.
x86 already gets this correct.
Signed-off-by: Ian Campbell <ian.campbell@citrix.com>
Cc: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
Cc: xen-devel@lists.xenproject.org
---
arch/arm/xen/enlighten.c |
2006 Apr 22
1
vm_normal_page() in linux-2.6-xen-sparse/mm/memory.c
vm_normal_page() @ linux-2.6-xen-sparse/mm/memory.c
...
if (!vma->vm_flags & VM_RESERVED)
print_bad_pte(vma, pte, addr);
note:VM_RESERVED=0x00080000
This if clause is always false.
Should it be "if (!(vma->vm_flags & VM_RESERVED))" ?
--
yamahata
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-d...
2011 Dec 18
4
crashes on 2.0.16
...t;f_op->mmap: generic_file_mmap+0x0/0x60
Dec 18 23:32:21 userimap1 kernel: [263492.282424] Pid: 19665, comm: imap Tainted: G B 2.6.32.36-xsserver #1
Dec 18 23:32:21 userimap1 kernel: [263492.282429] Call Trace:
Dec 18 23:32:21 userimap1 kernel: [263492.282441] [<ffffffff81103ee5>] print_bad_pte+0x1d5/0x280
Dec 18 23:32:21 userimap1 kernel: [263492.282448] [<ffffffff8110568a>] unmap_vmas+0xa1a/0xa20
Dec 18 23:32:21 userimap1 kernel: [263492.282458] [<ffffffff8137e501>] ? sch_direct_xmit+0x81/0x1d0
Dec 18 23:32:21 userimap1 kernel: [263492.282465] [<ffffffff8110b60d>]...
2013 Jul 11
1
Fault in dovecot 2.1.17
...->fault: filemap_fault+0x0/0x2fa
Jul 11 10:14:01 mail kernel: vma->vm_file->f_op->mmap:
ext4_file_mmap+0x0/0x39
Jul 11 10:14:01 mail kernel: Pid: 22889, comm: imap-login Not tainted
2.6.35.4 #2
Jul 11 10:14:01 mail kernel: Call Trace:
Jul 11 10:14:01 mail kernel: [<c1078901>] ? print_bad_pte+0x13a/0x14b
Jul 11 10:14:01 mail kernel: [<c107b206>] ? unmap_vmas+0x33b/0x62d
Jul 11 10:14:01 mail kernel: [<c10272cc>] ? try_to_wake_up+0x206/0x210
Jul 11 10:14:01 mail kernel: [<c107ccc7>] ? exit_mmap+0x8c/0x107
Jul 11 10:14:01 mail kernel: [<c102976f>] ? mmput+0x1c/...
2013 Jan 05
46
[Bug 59069] New: nouveau E[ DRM] fail ttm_validate
https://bugs.freedesktop.org/show_bug.cgi?id=59069
Priority: medium
Bug ID: 59069
Assignee: nouveau at lists.freedesktop.org
Summary: nouveau E[ DRM] fail ttm_validate
QA Contact: xorg-team at lists.x.org
Severity: major
Classification: Unclassified
OS: Linux (All)
Reporter: kees.bakker at xs4all.nl
2009 Jan 10
51
Xen with dom0 pvops on ultra-recent "git tip" kernel on x86_64
Hi everyone,
I am very excited to see that dom0 pvops is finally coming close to
working, so I wanted to give it a try.
>From the description it was not clear to me which kernel to chose as
base for the patches.hg, so I took the latest (that was ~ 2 weeks ago)
kernel on git.kernel.org I could find (post-2.6.28 git tip at that
point).
I managed to more or less apply all of the patches in the