public inbox for linux-ia64@vger.kernel.org
 help / color / mirror / Atom feed
* Mapping addresses 0xe000... and 0xc000...
@ 2004-01-15 22:31 Zoltan MENYHART
  2004-01-15 23:15 ` David Mosberger
  2004-01-16  6:52 ` Christian Hildner
  0 siblings, 2 replies; 3+ messages in thread
From: Zoltan MENYHART @ 2004-01-15 22:31 UTC (permalink / raw)
  To: linux-ia64

I guess most of my problems with "IA64_LOG_NEXT_BUFFER()", 
"salinfo_log_wakeup()", the KDB, unwinding the interrupted CPU's stack, 
etc. are related to the mapping of the addresses 0xe000... and 0xc000...

As far as I can see, when I touch such an address that is not mapped
by any TR or TC entry (the walker is off for these address ranges), then
the low level translation fault handler automatically inserts a new TC
entry that maps the address in the usual way.

Yet an alternate translation fault vector is used if the PSR.ic is off
(interrupts are disabled), and this handler does not map automatically
the addresses 0xe000... and 0xc000...

We are obliged to take locks and to disable interrupts, see e.g.
"IA64_LOG_NEXT_BUFFER()", the KDB.

Is it a VMM design issue not to allow automatic address mapping
if the PSR.ic is off ? Should not we revise it :-) ?

Zoltan Menyhart



^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2004-01-16  6:52 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2004-01-15 22:31 Mapping addresses 0xe000... and 0xc000 Zoltan MENYHART
2004-01-15 23:15 ` David Mosberger
2004-01-16  6:52 ` Christian Hildner

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox