Displaying 2 results from an estimated 2 matches for "_page_gnttab".
2006 Mar 15
0
implicit grant unmap hacking [was RE: Grant tables from dom0 userspace?]
...the implicit unmap off of the pte update
> validation code in Xen.
I''m investigating your suggestion with a quick experiment. I put a hack
into ptwr_do_page_fault(), which is one place where the pte address is
available. The hack simply does a prink() when detecting a pte with the
_PAGE_GNTTAB bit set. I never see the printk() when the OS squashes the
mapping PTE. Instead, I get the backtrace I already mentioned, namely:
(XEN) [<ff13603e>] put_page_from_l1e+0xd0/0x1af
(XEN) [<ff13a891>] revalidate_l1+0x159/0x168
(XEN) [<ff13aac1>] ptwr_flush+0x221/0x32f
(XEN...
2008 Nov 04
7
[PATCH 1/1] Xen PV support for hugepages
...2/page.h 2008-07-17 09:49:27.000000000 -0500
+++ xen-hpage/./xen/include/asm-x86/x86_32/page.h 2008-11-04 08:24:35.000000000 -0600
@@ -115,7 +115,7 @@ extern unsigned int PAGE_HYPERVISOR_NOCA
#define BASE_DISALLOW_MASK (0xFFFFF198U & ~_PAGE_NX)
#define L1_DISALLOW_MASK (BASE_DISALLOW_MASK | _PAGE_GNTTAB)
-#define L2_DISALLOW_MASK (BASE_DISALLOW_MASK)
+#define L2_DISALLOW_MASK (BASE_DISALLOW_MASK & ~_PAGE_PSE)
#define L3_DISALLOW_MASK 0xFFFFF1FEU /* must-be-zero */
#endif /* __X86_32_PAGE_H__ */
--- xen-unstable//./xen/include/asm-x86/x86_64/page.h 2008-10-02 14:23:17.000000000 -0500
+++ xe...