Displaying 6 results from an estimated 6 matches for "l1e_from_intpte".
2008 Mar 31
0
what''s the purpose of line page table (PML4 entry 258)
...lxr.xensource.com/lxr/source/xen/arch/x86/mm.c?a=x86_64#L3000> {
3001 <http://lxr.xensource.com/lxr/source/xen/arch/x86/mm.c?a=x86_64#L3001>
l1_pgentry_t
<http://lxr.xensource.com/lxr/ident?a=x86_64;i=l1_pgentry_t> val
<http://lxr.xensource.com/lxr/ident?a=x86_64;i=val> = l1e_from_intpte
<http://lxr.xensource.com/lxr/ident?a=x86_64;i=l1e_from_intpte>(val64);
3002 <http://lxr.xensource.com/lxr/source/xen/arch/x86/mm.c?a=x86_64#L3002>
struct vcpu <http://lxr.xensource.com/lxr/ident?a=x86_64;i=vcpu>
*v <http://lxr.xensource.com/lxr/ident?a=x86_64;i=v> = c...
2007 May 14
0
[PATCH] x86: replace some intpte_t * casts
...*)va;
- if ( !UPDATE_ENTRY(l1, va, ol1e, nl1e, mfn, v) )
+ if ( !UPDATE_ENTRY(l1, (l1_pgentry_t *)va, ol1e, nl1e, mfn, v) )
{
put_page_type(page);
rc = GNTST_general_error;
@@ -3278,7 +3278,7 @@ static int ptwr_emulated_update(
intpte_t t = old;
ol1e = l1e_from_intpte(old);
- okay = paging_cmpxchg_guest_entry(v, (intpte_t *) pl1e,
+ okay = paging_cmpxchg_guest_entry(v, &l1e_get_intpte(*pl1e),
&t, val, _mfn(mfn));
okay = (okay && t == old);
_________________________________...
2007 May 14
0
[PATCH] x86: ptwr adjustments
...PAGE_PRESENT)) == _PAGE_PRESENT);
+ ASSERT(mfn_valid(mfn));
ASSERT((page->u.inuse.type_info & PGT_type_mask) == PGT_l1_page_table);
ASSERT((page->u.inuse.type_info & PGT_count_mask) != 0);
ASSERT(page_get_owner(page) == d);
/* Check the new PTE. */
nl1e = l1e_from_intpte(val);
- if ( unlikely(!get_page_from_l1e(gl1e_to_ml1e(d, nl1e), d)) )
+ if ( unlikely(!get_page_from_l1e(nl1e, d)) )
{
if ( (CONFIG_PAGING_LEVELS >= 3) && is_pv_32bit_domain(d) &&
(bytes == 4) && (addr & 4) && !do_cmpxchg &...
2011 Jul 18
1
Re: trip to shanghai
.../* This pfn is higher than the
> highest the p2m map currently holds */
> return _mfn(INVALID_MFN);
>
> The p2m->max_mapped_pfn is usually 0xfffff. In our case,
> mmu_update.val exceeds 0x8000000100000000. Additionally, l1e =
> l1e_from_intpte(mmu_update.val); gfn=l1e_get_pfn(l1e ). Therefore, gfn
> will exceed 0xfffff.
>
> In the case of minios based stubdom, the mmu_update.vals do not
> exceed 0x8000000100000000. Next, I will invesgate why mmu_update.val
> exceeds 0x8000000100000000.
It looks like the address of the...
2011 Jul 21
51
Linux Stubdom Problem
...is higher than the
>> highest the p2m map currently holds */
>> return _mfn(INVALID_MFN);
>>
>> The p2m->max_mapped_pfn is usually 0xfffff. In our case,
>> mmu_update.val exceeds 0x8000000100000000. Additionally, l1e =
>> l1e_from_intpte(mmu_update.val); gfn=l1e_get_pfn(l1e ). Therefore, gfn
>> will exceed 0xfffff.
>>
>> In the case of minios based stubdom, the mmu_update.vals do not
>> exceed 0x8000000100000000. Next, I will invesgate why mmu_update.val
>> exceeds 0x8000000100000000.
>
> It l...
2012 Jan 31
26
[PATCH 00/10] FLASK updates: MSI interrupts, cleanups
This patch set adds XSM security labels to useful debugging output
locations, and fixes some assumptions that all interrupts behaved like
GSI interrupts (which had useful non-dynamic IDs). It also cleans up the
policy build process and adds an example of how to use the user field in
the security context.
Debug output:
[PATCH 01/10] xsm: Add security labels to event-channel dump
[PATCH 02/10] xsm: