]> git.ipfire.org Git - people/pmueller/ipfire-2.x.git/blame - src/patches/suse-2.6.27.31/patches.kabi/xen3-e1000e_Export_set_memory_ro-rw
Move xen patchset to new version's subdir.
[people/pmueller/ipfire-2.x.git] / src / patches / suse-2.6.27.31 / patches.kabi / xen3-e1000e_Export_set_memory_ro-rw
CommitLineData
00e5a55c
BS
1From: Bruce Allan <bruce.w.allan@intel.com>
2Subject: Export set_memory_ro() and set_memory_rw() calls.
3References: bnc#425480
4Acked-by: Karsten Keil <kkeil@novell.com>
5
6Export set_memory_ro() and set_memory_rw() calls. Soon to be used
7by e1000e.
8
9Signed-off-by: Bruce Allan <bruce.w.allan@intel.com>
10Signed-off-by: Jesse Brandeburg <jesse.brandeburg@intel.com>
11Automatically created from "patches.suse/e1000e_Export_set_memory_ro-rw" by xen-port-patches.py
12
13--- sle11-2009-03-16.orig/arch/x86/mm/pageattr-xen.c 2009-03-16 16:39:52.000000000 +0100
14+++ sle11-2009-03-16/arch/x86/mm/pageattr-xen.c 2009-03-16 16:40:01.000000000 +0100
15@@ -1007,11 +1007,13 @@ int set_memory_ro(unsigned long addr, in
16 {
17 return change_page_attr_clear(addr, numpages, __pgprot(_PAGE_RW));
18 }
19+EXPORT_SYMBOL(set_memory_ro);
20
21 int set_memory_rw(unsigned long addr, int numpages)
22 {
23 return change_page_attr_set(addr, numpages, __pgprot(_PAGE_RW));
24 }
25+EXPORT_SYMBOL(set_memory_rw);
26
27 /* hack: bypass kernel rodata section static_protections check. */
28 int set_memory_rw_force(unsigned long addr, int numpages)