[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-changelog] [linux-2.6.18-xen] linux: more users of __pte_val/__p[mug]d_val



# HG changeset patch
# User Keir Fraser <keir@xxxxxxxxxxxxx>
# Date 1193324859 -3600
# Node ID 68398c665b33c052eb1460efc98d80f86312a641
# Parent  2b8d5e48dddadcbd590b98aa8945348d36e91191
linux: more users of __pte_val/__p[mug]d_val

Use __pXX_val() instead of pXX_val() when only flags are accessed.

Signed-off-by: Jan Beulich <jbeulich@xxxxxxxxxx>
---
 arch/i386/mm/fault-xen.c                  |    2 +-
 arch/x86_64/mm/fault-xen.c                |    2 +-
 arch/x86_64/mm/init-xen.c                 |    4 ++--
 arch/x86_64/mm/pageattr-xen.c             |    2 +-
 include/asm-x86_64/mach-xen/asm/pgtable.h |    2 +-
 5 files changed, 6 insertions(+), 6 deletions(-)

diff -r 2b8d5e48ddda -r 68398c665b33 arch/i386/mm/fault-xen.c
--- a/arch/i386/mm/fault-xen.c  Thu Oct 25 15:59:40 2007 +0100
+++ b/arch/i386/mm/fault-xen.c  Thu Oct 25 16:07:39 2007 +0100
@@ -346,7 +346,7 @@ static int spurious_fault(struct pt_regs
        if ((error_code & 0x02) && !pte_write(*pte))
                return 0;
 #ifdef CONFIG_X86_PAE
-       if ((error_code & 0x10) && (pte_val(*pte) & _PAGE_NX))
+       if ((error_code & 0x10) && (__pte_val(*pte) & _PAGE_NX))
                return 0;
 #endif
 
diff -r 2b8d5e48ddda -r 68398c665b33 arch/x86_64/mm/fault-xen.c
--- a/arch/x86_64/mm/fault-xen.c        Thu Oct 25 15:59:40 2007 +0100
+++ b/arch/x86_64/mm/fault-xen.c        Thu Oct 25 16:07:39 2007 +0100
@@ -380,7 +380,7 @@ static int spurious_fault(struct pt_regs
                return 0;
        if ((error_code & PF_WRITE) && !pte_write(*pte))
                return 0;
-       if ((error_code & PF_INSTR) && (pte_val(*pte) & _PAGE_NX))
+       if ((error_code & PF_INSTR) && (__pte_val(*pte) & _PAGE_NX))
                return 0;
 
        return 1;
diff -r 2b8d5e48ddda -r 68398c665b33 arch/x86_64/mm/init-xen.c
--- a/arch/x86_64/mm/init-xen.c Thu Oct 25 15:59:40 2007 +0100
+++ b/arch/x86_64/mm/init-xen.c Thu Oct 25 16:07:39 2007 +0100
@@ -272,7 +272,7 @@ static __init void set_pte_phys(unsigned
 
        pte = pte_offset_kernel(pmd, vaddr);
        if (!pte_none(*pte) &&
-           pte_val(*pte) != (pte_val(new_pte) & __supported_pte_mask))
+           __pte_val(*pte) != (__pte_val(new_pte) & __supported_pte_mask))
                pte_ERROR(*pte);
        set_pte(pte, new_pte);
 
@@ -868,7 +868,7 @@ void __init clear_kernel_mapping(unsigne
                pmd = pmd_offset(pud, address);
                if (!pmd || pmd_none(*pmd))
                        continue; 
-               if (0 == (pmd_val(*pmd) & _PAGE_PSE)) { 
+               if (0 == (__pmd_val(*pmd) & _PAGE_PSE)) {
                        /* Could handle this, but it should not happen 
currently. */
                        printk(KERN_ERR 
               "clear_kernel_mapping: mapping has been split. will leak 
memory\n"); 
diff -r 2b8d5e48ddda -r 68398c665b33 arch/x86_64/mm/pageattr-xen.c
--- a/arch/x86_64/mm/pageattr-xen.c     Thu Oct 25 15:59:40 2007 +0100
+++ b/arch/x86_64/mm/pageattr-xen.c     Thu Oct 25 16:07:39 2007 +0100
@@ -370,7 +370,7 @@ static void revert_page(unsigned long ad
        pud = pud_offset(pgd,address);
        BUG_ON(pud_none(*pud));
        pmd = pmd_offset(pud, address);
-       BUG_ON(pmd_val(*pmd) & _PAGE_PSE);
+       BUG_ON(__pmd_val(*pmd) & _PAGE_PSE);
        pgprot_val(ref_prot) |= _PAGE_PSE;
        large_pte = mk_pte_phys(__pa(address) & LARGE_PAGE_MASK, ref_prot);
        set_pte((pte_t *)pmd, large_pte);
diff -r 2b8d5e48ddda -r 68398c665b33 include/asm-x86_64/mach-xen/asm/pgtable.h
--- a/include/asm-x86_64/mach-xen/asm/pgtable.h Thu Oct 25 15:59:40 2007 +0100
+++ b/include/asm-x86_64/mach-xen/asm/pgtable.h Thu Oct 25 16:07:39 2007 +0100
@@ -505,7 +505,7 @@ static inline pte_t pte_modify(pte_t pte
 #define __swp_type(x)                  (((x).val >> 1) & 0x3f)
 #define __swp_offset(x)                        ((x).val >> 8)
 #define __swp_entry(type, offset)      ((swp_entry_t) { ((type) << 1) | 
((offset) << 8) })
-#define __pte_to_swp_entry(pte)                ((swp_entry_t) { pte_val(pte) })
+#define __pte_to_swp_entry(pte)                ((swp_entry_t) { __pte_val(pte) 
})
 #define __swp_entry_to_pte(x)          ((pte_t) { (x).val })
 
 extern spinlock_t pgd_lock;

_______________________________________________
Xen-changelog mailing list
Xen-changelog@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-changelog


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.