//
// Get the PDE
//
- PointerPde = MiGetPdeAddress(Address);
+ PointerPde = MiAddressToPde(Address);
if (PointerPde->u.Hard.Coarse.Valid)
{
//
// Save it
//
//MmGlobalKernelPageDirectory[PdeOffset] = TempPde.u.Hard.AsUlong;
- //DPRINT1("KPD: %p PDEADDR: %p\n", &MmGlobalKernelPageDirectory[PdeOffset], MiGetPdeAddress(Address));
+ //DPRINT1("KPD: %p PDEADDR: %p\n", &MmGlobalKernelPageDirectory[PdeOffset], MiAddressToPde(Address));
//
// FIXFIX: Double check with Felix tomorrow
//
// Get the PTE for this 1MB region
//
- PointerPte = MiGetPteAddress(MiGetPteAddress(Address));
+ PointerPte = MiAddressToPte(MiAddressToPte(Address));
DPRINT1("PointerPte: %p\n", PointerPte);
//
//
// Return the PTE
//
- return MiGetPteAddress(Address);
+ return MiAddressToPte(Address);
}
MMPTE
return TRUE;
}
-PULONG
-NTAPI
-MmGetPageDirectory(VOID)
-{
- //
- // Return the TTB
- //
- return (PULONG)KeArmTranslationTableRegisterGet().AsUlong;
-}
-
NTSTATUS
NTAPI
MmCreateVirtualMappingInternal(IN PEPROCESS Process,
// Good place to setup template PTE/PDEs.
// We are lazy and pick a known-good PTE
//
- MiArmTemplatePte = *MiGetPteAddress(0x80000000);
- MiArmTemplatePde = *MiGetPdeAddress(0x80000000);
+ MiArmTemplatePte = *MiAddressToPte(0x80000000);
+ MiArmTemplatePde = *MiAddressToPde(0x80000000);
//
// Loop the 2GB of address space which belong to the kernel
// ARM Hack while we still use a section PTE
//
PMMPDE_HARDWARE PointerPde;
- PointerPde = MiGetPdeAddress(PCR);
+ PointerPde = MiAddressToPde(PCR);
ASSERT(PointerPde->u.Hard.Section.Valid == 1);
PhysicalAddress.QuadPart = PointerPde->u.Hard.Section.PageFrameNumber;
PhysicalAddress.QuadPart <<= CPT_SHIFT;