Searched refs:gpte (Results 1 – 8 of 8) sorted by relevance
/linux-6.3-rc2/arch/powerpc/kvm/ |
A D | book3s_64_mmu.c | 213 gpte->eaddr = eaddr; in kvmppc_mmu_book3s_64_xlate() 215 gpte->raddr = vcpu->arch.magic_page_pa | (gpte->raddr & 0xfff); in kvmppc_mmu_book3s_64_xlate() 216 gpte->raddr &= KVM_PAM; in kvmppc_mmu_book3s_64_xlate() 218 gpte->may_read = true; in kvmppc_mmu_book3s_64_xlate() 219 gpte->may_write = true; in kvmppc_mmu_book3s_64_xlate() 221 gpte->wimg = HPTE_R_M; in kvmppc_mmu_book3s_64_xlate() 293 gpte->eaddr = eaddr; in kvmppc_mmu_book3s_64_xlate() 303 gpte->may_read = false; in kvmppc_mmu_book3s_64_xlate() 318 gpte->may_read = true; in kvmppc_mmu_book3s_64_xlate() 324 eaddr, avpn, gpte->vpage, gpte->raddr); in kvmppc_mmu_book3s_64_xlate() [all …]
|
A D | book3s_64_mmu_radix.c | 205 gpte->page_size = ps; in kvmppc_mmu_walk_radix_tree() 206 gpte->page_shift = offset; in kvmppc_mmu_walk_radix_tree() 208 gpte->eaddr = eaddr; in kvmppc_mmu_walk_radix_tree() 209 gpte->raddr = gpa; in kvmppc_mmu_walk_radix_tree() 212 gpte->may_read = !!(pte & _PAGE_READ); in kvmppc_mmu_walk_radix_tree() 290 gpte->may_read = 0; in kvmppc_mmu_radix_xlate() 291 gpte->may_write = 0; in kvmppc_mmu_radix_xlate() 292 gpte->may_execute = 0; in kvmppc_mmu_radix_xlate() 298 gpte->may_read = 0; in kvmppc_mmu_radix_xlate() 300 gpte->may_write = 0; in kvmppc_mmu_radix_xlate() [all …]
|
A D | book3s_hv_nested.c | 1423 struct kvmppc_pte gpte, in kvmhv_handle_nested_set_rc() argument 1435 if (pgflags & ~gpte.rc) in kvmhv_handle_nested_set_rc() 1441 gpte.raddr, kvm->arch.lpid); in kvmhv_handle_nested_set_rc() 1491 struct kvmppc_pte gpte; in __kvmhv_nested_page_fault() local 1530 ret = kvmhv_handle_nested_set_rc(vcpu, gp, n_gpa, gpte, dsisr); in __kvmhv_nested_page_fault() 1547 l1_shift = gpte.page_shift; in __kvmhv_nested_page_fault() 1554 gpa = gpte.raddr; in __kvmhv_nested_page_fault() 1612 perm |= gpte.may_read ? 0UL : _PAGE_READ; in __kvmhv_nested_page_fault() 1613 perm |= gpte.may_write ? 0UL : _PAGE_WRITE; in __kvmhv_nested_page_fault() 1614 perm |= gpte.may_execute ? 0UL : _PAGE_EXEC; in __kvmhv_nested_page_fault() [all …]
|
A D | book3s_64_mmu_hv.c | 341 struct kvmppc_pte *gpte, bool data, bool iswrite) in kvmppc_mmu_book3s_64_hv_xlate() argument 353 return kvmppc_mmu_radix_xlate(vcpu, eaddr, gpte, data, iswrite); in kvmppc_mmu_book3s_64_hv_xlate() 383 gpte->eaddr = eaddr; in kvmppc_mmu_book3s_64_hv_xlate() 384 gpte->vpage = ((v & HPTE_V_AVPN) << 4) | ((eaddr >> 12) & 0xfff); in kvmppc_mmu_book3s_64_hv_xlate() 392 gpte->may_read = hpte_read_permission(pp, key); in kvmppc_mmu_book3s_64_hv_xlate() 393 gpte->may_write = hpte_write_permission(pp, key); in kvmppc_mmu_book3s_64_hv_xlate() 394 gpte->may_execute = gpte->may_read && !(gr & (HPTE_R_N | HPTE_R_G)); in kvmppc_mmu_book3s_64_hv_xlate() 400 gpte->may_read = 0; in kvmppc_mmu_book3s_64_hv_xlate() 402 gpte->may_write = 0; in kvmppc_mmu_book3s_64_hv_xlate() 406 gpte->raddr = kvmppc_mmu_get_real_addr(v, gr, eaddr); in kvmppc_mmu_book3s_64_hv_xlate()
|
/linux-6.3-rc2/arch/x86/kvm/mmu/ |
A D | paging_tmpl.h | 110 unsigned gpte) in FNAME() 153 u64 gpte) in FNAME() 155 if (!FNAME(is_present_gpte)(gpte)) in FNAME() 191 access ^= (gpte >> PT64_NX_SHIFT); in FNAME() 263 pte_t pte = {.pte = gpte}; in FNAME() 295 gpte |= level - PG_LEVEL_4K - 1; in FNAME() 297 return gpte & PT_PAGE_SIZE_MASK; in FNAME() 534 gfn = gpte_to_gfn(gpte); in FNAME() 919 pt_element_t gpte; in FNAME() local 1024 pt_element_t gpte; in FNAME() local [all …]
|
/linux-6.3-rc2/arch/powerpc/include/asm/ |
A D | kvm_book3s.h | 186 struct kvmppc_pte *gpte, u64 root, 189 struct kvmppc_pte *gpte, u64 table, 192 struct kvmppc_pte *gpte, bool data, bool iswrite);
|
/linux-6.3-rc2/Documentation/virt/kvm/x86/ |
A D | mmu.rst | 54 gpte guest pte (referring to gfns) 168 first or second 512-gpte block in the guest page table. For second-level 169 page tables, each 32-bit gpte is converted to two 64-bit sptes 279 protected, and synchronize sptes to gptes when a gpte is written. 343 - if successful, we can let the guest continue and modify the gpte 382 we cannot map the permissions for gpte.u=1, gpte.w=0 to any spte (the 400 spte.nx=gpte.nx back. For this to work, KVM forces EFER.NX to 1 when
|
/linux-6.3-rc2/Documentation/virt/kvm/ |
A D | locking.rst | 94 | gpte = gfn1 | 96 | spte is the shadow page table entry corresponding with gpte and | 113 | | gpte is changed to point to |
|
Completed in 19 milliseconds