]> git.ipfire.org Git - ipfire-2.x.git/blob - src/patches/suse-2.6.27.31/patches.kabi/xen3-e1000e_Export_set_memory_ro-rw
Add a patch to fix Intel E100 wake-on-lan problems.
[ipfire-2.x.git] / src / patches / suse-2.6.27.31 / patches.kabi / xen3-e1000e_Export_set_memory_ro-rw
1 From: Bruce Allan <bruce.w.allan@intel.com>
2 Subject: Export set_memory_ro() and set_memory_rw() calls.
3 References: bnc#425480
4 Acked-by: Karsten Keil <kkeil@novell.com>
5
6 Export set_memory_ro() and set_memory_rw() calls. Soon to be used
7 by e1000e.
8
9 Signed-off-by: Bruce Allan <bruce.w.allan@intel.com>
10 Signed-off-by: Jesse Brandeburg <jesse.brandeburg@intel.com>
11 Automatically created from "patches.suse/e1000e_Export_set_memory_ro-rw" by xen-port-patches.py
12
13 --- sle11-2009-03-16.orig/arch/x86/mm/pageattr-xen.c 2009-03-16 16:39:52.000000000 +0100
14 +++ sle11-2009-03-16/arch/x86/mm/pageattr-xen.c 2009-03-16 16:40:01.000000000 +0100
15 @@ -1007,11 +1007,13 @@ int set_memory_ro(unsigned long addr, in
16 {
17 return change_page_attr_clear(addr, numpages, __pgprot(_PAGE_RW));
18 }
19 +EXPORT_SYMBOL(set_memory_ro);
20
21 int set_memory_rw(unsigned long addr, int numpages)
22 {
23 return change_page_attr_set(addr, numpages, __pgprot(_PAGE_RW));
24 }
25 +EXPORT_SYMBOL(set_memory_rw);
26
27 /* hack: bypass kernel rodata section static_protections check. */
28 int set_memory_rw_force(unsigned long addr, int numpages)