Displaying 8 results from an estimated 8 matches for "pl1e".
Did you mean:
pl1
2007 May 14
0
[PATCH] x86: ptwr adjustments
...gt;= 3) && is_pv_32bit_domain(d) &&
(bytes == 4) && (addr & 4) && !do_cmpxchg &&
@@ -3270,7 +3271,7 @@ static int ptwr_emulated_update(
adjust_guest_l1e(nl1e, d);
/* Checked successfully: do the update (write or cmpxchg). */
- pl1e = map_domain_page(page_to_mfn(page));
+ pl1e = map_domain_page(mfn);
pl1e = (l1_pgentry_t *)((unsigned long)pl1e + (addr & ~PAGE_MASK));
if ( do_cmpxchg )
{
@@ -3285,21 +3286,21 @@ static int ptwr_emulated_update(
if ( !okay )
{
unmap_domain_page...
2005 Mar 14
4
[patch/unstable] page table cleanups
...=
--- xen.orig/arch/x86/shadow.c 2005-03-10 11:55:10.000000000 +0100
+++ xen/arch/x86/shadow.c 2005-03-14 12:34:26.000000000 +0100
@@ -532,13 +532,15 @@ static void shadow_map_l1_into_current_l
{
struct exec_domain *ed = current;
struct domain *d = ed->domain;
- unsigned long *gpl1e, *spl1e, gl2e, sl2e, gl1pfn, sl1mfn, sl1ss;
+ l1_pgentry_t *gpl1e, *spl1e;
+ l2_pgentry_t gl2e, sl2e;
+ unsigned long gl1pfn, sl1mfn, sl1ss;
struct pfn_info *sl1mfn_info;
int i;
__guest_get_l2e(ed, va, &gl2e);
- gl1pfn = gl2e >> PAG...
2007 May 14
0
[PATCH] x86: replace some intpte_t * casts
...(l1, (l1_pgentry_t *)va, ol1e, nl1e, mfn, v) )
{
put_page_type(page);
rc = GNTST_general_error;
@@ -3278,7 +3278,7 @@ static int ptwr_emulated_update(
intpte_t t = old;
ol1e = l1e_from_intpte(old);
- okay = paging_cmpxchg_guest_entry(v, (intpte_t *) pl1e,
+ okay = paging_cmpxchg_guest_entry(v, &l1e_get_intpte(*pl1e),
&t, val, _mfn(mfn));
okay = (okay && t == old);
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http...
2006 Oct 04
4
Can''t set break points with Linux guest in PAE mode
...8.0 entered promiscuous mode
(XEN) DOM0: (file=mm.c, line=1688) Bad type (saw 28000001 != exp
e0000000) for mfn 96efe (pfn 573)
(XEN) DOM0: (file=mm.c, line=606) Error getting mfn 96efe (pfn 573)
from L1 entry 0000000096efe027 for dom8
(XEN) DOM0: (file=mm.c, line=1266) Bad get_page_from_l1e(): pl1e =
fefa6a30, nl1e = 96efe027, ol1e = 0, gl1mfn = d8538
(XEN) DOM0: (file=mm.c, line=2283) Could not modify L1 entry: va ==
fefa6a30, l1e == 96efe027, mfn == d8538
(I''ve added the two MEM_LOG() calls at line 1266 and 2283.)
Any ideas where I should begin looking? Or is PAE support lan...
2013 Dec 06
36
[V6 PATCH 0/7]: PVH dom0....
Hi,
V6: The only change from V5 is in patch #6:
- changed comment to reflect autoxlate
- removed a redundant ASSERT
- reworked logic a bit so that get_page_from_gfn() is called with NULL
for p2m type as before. arm has ASSERT wanting it to be NULL.
Tim: patch 4 needs your approval.
Daniel: patch 5 needs your approval.
These patches implement PVH dom0.
Patches 1 and 2
2008 Mar 31
0
what''s the purpose of line page table (PML4 entry 258)
...v
<http://lxr.xensource.com/lxr/ident?a=x86_64;i=v>->domain
<http://lxr.xensource.com/lxr/ident?a=x86_64;i=domain>;
3004 <http://lxr.xensource.com/lxr/source/xen/arch/x86/mm.c?a=x86_64#L3004>
l1_pgentry_t
<http://lxr.xensource.com/lxr/ident?a=x86_64;i=l1_pgentry_t> *pl1e;
3005 <http://lxr.xensource.com/lxr/source/xen/arch/x86/mm.c?a=x86_64#L3005>
unsigned long vmask, bmap_ptr, gl1mfn;
3006 <http://lxr.xensource.com/lxr/source/xen/arch/x86/mm.c?a=x86_64#L3006>
cpumask_t <http://lxr.xensource.com/lxr/ident?a=x86_64;i=cpumask_t>
pmask;...
2007 Mar 20
62
RFC: [0/2] Remove netloop by lazy copying in netback
Hi Keir:
These two patches remove the need for netloop by performing the
copying in netback and only if it is necessary. The rationale
is that most packets will be processed without delay allowing
them to be freed without copying at all. So instead of copying
every packet destined to dom0 we''ll only copy those that linger
longer than a specified amount of time (currently 0.5s).
As it
2007 Jul 02
3
Walking an HVM''s shadow page tables and other memory management questions.
...1, pfn:0xe9a
(XEN) , mfn:0x9e13d<G><1>multi.c:285:d1 hypervisor l2e mapped address
0xfec8b058
(XEN) multi.c:315:d1 large pages. 0x1e3
(XEN) multi.c:574:d1 sh_guest_map_l1e: va:81696000
(XEN) multi.c:579:d1 sh_guest_map_l1e: gw.l2e flags:0x1e3, supports
large 1
(XEN) multi.c:596:d1 pl1e :0x0,
(XEN) mm.c:2512:d1 Could not find L1 PTE for address 81696000
It looks like it specifically avoids mapping a superpage found in
Windows PDE into the hypervisor''s virtual space, which I assume are
4KB-pages. What puzzles me is that for a hypercall to read the
arguments from...