search for: _page_gnttab

Displaying 2 results from an estimated 2 matches for "_page_gnttab".

2006 Mar 15
0
implicit grant unmap hacking [was RE: Grant tables from dom0 userspace?]
...the implicit unmap off of the pte update > validation code in Xen. I''m investigating your suggestion with a quick experiment. I put a hack into ptwr_do_page_fault(), which is one place where the pte address is available. The hack simply does a prink() when detecting a pte with the _PAGE_GNTTAB bit set. I never see the printk() when the OS squashes the mapping PTE. Instead, I get the backtrace I already mentioned, namely: (XEN) [<ff13603e>] put_page_from_l1e+0xd0/0x1af (XEN) [<ff13a891>] revalidate_l1+0x159/0x168 (XEN) [<ff13aac1>] ptwr_flush+0x221/0x32f (XEN...
2008 Nov 04
7
[PATCH 1/1] Xen PV support for hugepages
...2/page.h 2008-07-17 09:49:27.000000000 -0500 +++ xen-hpage/./xen/include/asm-x86/x86_32/page.h 2008-11-04 08:24:35.000000000 -0600 @@ -115,7 +115,7 @@ extern unsigned int PAGE_HYPERVISOR_NOCA #define BASE_DISALLOW_MASK (0xFFFFF198U & ~_PAGE_NX) #define L1_DISALLOW_MASK (BASE_DISALLOW_MASK | _PAGE_GNTTAB) -#define L2_DISALLOW_MASK (BASE_DISALLOW_MASK) +#define L2_DISALLOW_MASK (BASE_DISALLOW_MASK & ~_PAGE_PSE) #define L3_DISALLOW_MASK 0xFFFFF1FEU /* must-be-zero */ #endif /* __X86_32_PAGE_H__ */ --- xen-unstable//./xen/include/asm-x86/x86_64/page.h 2008-10-02 14:23:17.000000000 -0500 +++ xe...