Le 24/05/2019 à 15:29, Aaro Koskinen a écrit :
Hi,

On Fri, May 24, 2019 at 09:40:30AM +0200, Christophe Leroy wrote:
Le 24/05/2019 à 09:36, Aaro Koskinen a écrit :
On Fri, May 24, 2019 at 08:08:36AM +0200, Christophe Leroy wrote:
Le 24/05/2019 à 00:23, Aaro Koskinen a écrit :
Unfortunately still no luck... The crash is pretty much the same with
both
changes.

Right. In fact change_page_attr() does nothing because this part of RAM is
mapped by DBATs so v_block_mapped() returns not NULL.

So, we have to set an IBAT for this area. I'll try and send you a new
patch for that before noon (CET).


patch sent out. In the patch I have also added a printk to print the buffer
address, so if the problem still occurs, we'll know if the problem is really
at the address of the buffer or if we are wrong from the beginning.

Reboot code buffer at ef0c3000
Bye!
BUG: Unable to handle kernel instruction fetch
Faulting instruction address: 0xef0c3000


Oops, I forgot to call update_bats() after setibat().

Can you add it and retry ?

Thanks, that was it, now it finally works!


Thanks for reporting the issue and testing.

I'll work on a clean fix patch in the begining of June.

Christophe

Reply via email to