search for: l1e_from_intpt

Displaying 6 results from an estimated 6 matches for "l1e_from_intpt".

Did you mean: l1e_from_intpte
2008 Mar 31
0
what''s the purpose of line page table (PML4 entry 258)
...lxr.xensource.com/lxr/source/xen/arch/x86/mm.c?a=x86_64#L3000> { 3001 <http://lxr.xensource.com/lxr/source/xen/arch/x86/mm.c?a=x86_64#L3001> l1_pgentry_t <http://lxr.xensource.com/lxr/ident?a=x86_64;i=l1_pgentry_t> val <http://lxr.xensource.com/lxr/ident?a=x86_64;i=val> = l1e_from_intpte <http://lxr.xensource.com/lxr/ident?a=x86_64;i=l1e_from_intpte>(val64); 3002 <http://lxr.xensource.com/lxr/source/xen/arch/x86/mm.c?a=x86_64#L3002> struct vcpu <http://lxr.xensource.com/lxr/ident?a=x86_64;i=vcpu> *v <http://lxr.xensource.com/lxr/ident?a=x86_64;i=v> =...
2007 May 14
0
[PATCH] x86: replace some intpte_t * casts
...*)va; - if ( !UPDATE_ENTRY(l1, va, ol1e, nl1e, mfn, v) ) + if ( !UPDATE_ENTRY(l1, (l1_pgentry_t *)va, ol1e, nl1e, mfn, v) ) { put_page_type(page); rc = GNTST_general_error; @@ -3278,7 +3278,7 @@ static int ptwr_emulated_update( intpte_t t = old; ol1e = l1e_from_intpte(old); - okay = paging_cmpxchg_guest_entry(v, (intpte_t *) pl1e, + okay = paging_cmpxchg_guest_entry(v, &l1e_get_intpte(*pl1e), &t, val, _mfn(mfn)); okay = (okay && t == old); ________________________________...
2007 May 14
0
[PATCH] x86: ptwr adjustments
...PAGE_PRESENT)) == _PAGE_PRESENT); + ASSERT(mfn_valid(mfn)); ASSERT((page->u.inuse.type_info & PGT_type_mask) == PGT_l1_page_table); ASSERT((page->u.inuse.type_info & PGT_count_mask) != 0); ASSERT(page_get_owner(page) == d); /* Check the new PTE. */ nl1e = l1e_from_intpte(val); - if ( unlikely(!get_page_from_l1e(gl1e_to_ml1e(d, nl1e), d)) ) + if ( unlikely(!get_page_from_l1e(nl1e, d)) ) { if ( (CONFIG_PAGING_LEVELS >= 3) && is_pv_32bit_domain(d) && (bytes == 4) && (addr & 4) && !do_cmpxchg &am...
2011 Jul 18
1
Re: trip to shanghai
.../* This pfn is higher than the > highest the p2m map currently holds */ > return _mfn(INVALID_MFN); > > The p2m->max_mapped_pfn is usually 0xfffff. In our case, > mmu_update.val exceeds 0x8000000100000000. Additionally, l1e = > l1e_from_intpte(mmu_update.val); gfn=l1e_get_pfn(l1e ). Therefore, gfn > will exceed 0xfffff. > > In the case of minios based stubdom, the mmu_update.vals do not > exceed 0x8000000100000000. Next, I will invesgate why mmu_update.val > exceeds 0x8000000100000000. It looks like the address of th...
2011 Jul 21
51
Linux Stubdom Problem
...is higher than the >> highest the p2m map currently holds */ >>                                    return _mfn(INVALID_MFN); >> >>    The p2m->max_mapped_pfn is usually 0xfffff. In our case, >> mmu_update.val exceeds 0x8000000100000000.  Additionally, l1e = >> l1e_from_intpte(mmu_update.val); gfn=l1e_get_pfn(l1e ). Therefore, gfn >> will exceed 0xfffff. >> >>    In the case of minios based stubdom, the mmu_update.vals do not >> exceed 0x8000000100000000. Next, I will invesgate why mmu_update.val >> exceeds 0x8000000100000000. > > It...
2012 Jan 31
26
[PATCH 00/10] FLASK updates: MSI interrupts, cleanups
This patch set adds XSM security labels to useful debugging output locations, and fixes some assumptions that all interrupts behaved like GSI interrupts (which had useful non-dynamic IDs). It also cleans up the policy build process and adds an example of how to use the user field in the security context. Debug output: [PATCH 01/10] xsm: Add security labels to event-channel dump [PATCH 02/10] xsm: