Home
last modified time | relevance | path

Searched refs:gpte (Results 1 – 8 of 8) sorted by relevance

/linux-6.3-rc2/arch/powerpc/kvm/
A Dbook3s_64_mmu.c213 gpte->eaddr = eaddr; in kvmppc_mmu_book3s_64_xlate()
215 gpte->raddr = vcpu->arch.magic_page_pa | (gpte->raddr & 0xfff); in kvmppc_mmu_book3s_64_xlate()
216 gpte->raddr &= KVM_PAM; in kvmppc_mmu_book3s_64_xlate()
218 gpte->may_read = true; in kvmppc_mmu_book3s_64_xlate()
219 gpte->may_write = true; in kvmppc_mmu_book3s_64_xlate()
221 gpte->wimg = HPTE_R_M; in kvmppc_mmu_book3s_64_xlate()
293 gpte->eaddr = eaddr; in kvmppc_mmu_book3s_64_xlate()
303 gpte->may_read = false; in kvmppc_mmu_book3s_64_xlate()
318 gpte->may_read = true; in kvmppc_mmu_book3s_64_xlate()
324 eaddr, avpn, gpte->vpage, gpte->raddr); in kvmppc_mmu_book3s_64_xlate()
[all …]
A Dbook3s_64_mmu_radix.c205 gpte->page_size = ps; in kvmppc_mmu_walk_radix_tree()
206 gpte->page_shift = offset; in kvmppc_mmu_walk_radix_tree()
208 gpte->eaddr = eaddr; in kvmppc_mmu_walk_radix_tree()
209 gpte->raddr = gpa; in kvmppc_mmu_walk_radix_tree()
212 gpte->may_read = !!(pte & _PAGE_READ); in kvmppc_mmu_walk_radix_tree()
290 gpte->may_read = 0; in kvmppc_mmu_radix_xlate()
291 gpte->may_write = 0; in kvmppc_mmu_radix_xlate()
292 gpte->may_execute = 0; in kvmppc_mmu_radix_xlate()
298 gpte->may_read = 0; in kvmppc_mmu_radix_xlate()
300 gpte->may_write = 0; in kvmppc_mmu_radix_xlate()
[all …]
A Dbook3s_hv_nested.c1423 struct kvmppc_pte gpte, in kvmhv_handle_nested_set_rc() argument
1435 if (pgflags & ~gpte.rc) in kvmhv_handle_nested_set_rc()
1441 gpte.raddr, kvm->arch.lpid); in kvmhv_handle_nested_set_rc()
1491 struct kvmppc_pte gpte; in __kvmhv_nested_page_fault() local
1530 ret = kvmhv_handle_nested_set_rc(vcpu, gp, n_gpa, gpte, dsisr); in __kvmhv_nested_page_fault()
1547 l1_shift = gpte.page_shift; in __kvmhv_nested_page_fault()
1554 gpa = gpte.raddr; in __kvmhv_nested_page_fault()
1612 perm |= gpte.may_read ? 0UL : _PAGE_READ; in __kvmhv_nested_page_fault()
1613 perm |= gpte.may_write ? 0UL : _PAGE_WRITE; in __kvmhv_nested_page_fault()
1614 perm |= gpte.may_execute ? 0UL : _PAGE_EXEC; in __kvmhv_nested_page_fault()
[all …]
A Dbook3s_64_mmu_hv.c341 struct kvmppc_pte *gpte, bool data, bool iswrite) in kvmppc_mmu_book3s_64_hv_xlate() argument
353 return kvmppc_mmu_radix_xlate(vcpu, eaddr, gpte, data, iswrite); in kvmppc_mmu_book3s_64_hv_xlate()
383 gpte->eaddr = eaddr; in kvmppc_mmu_book3s_64_hv_xlate()
384 gpte->vpage = ((v & HPTE_V_AVPN) << 4) | ((eaddr >> 12) & 0xfff); in kvmppc_mmu_book3s_64_hv_xlate()
392 gpte->may_read = hpte_read_permission(pp, key); in kvmppc_mmu_book3s_64_hv_xlate()
393 gpte->may_write = hpte_write_permission(pp, key); in kvmppc_mmu_book3s_64_hv_xlate()
394 gpte->may_execute = gpte->may_read && !(gr & (HPTE_R_N | HPTE_R_G)); in kvmppc_mmu_book3s_64_hv_xlate()
400 gpte->may_read = 0; in kvmppc_mmu_book3s_64_hv_xlate()
402 gpte->may_write = 0; in kvmppc_mmu_book3s_64_hv_xlate()
406 gpte->raddr = kvmppc_mmu_get_real_addr(v, gr, eaddr); in kvmppc_mmu_book3s_64_hv_xlate()
/linux-6.3-rc2/arch/x86/kvm/mmu/
A Dpaging_tmpl.h110 unsigned gpte) in FNAME()
153 u64 gpte) in FNAME()
155 if (!FNAME(is_present_gpte)(gpte)) in FNAME()
191 access ^= (gpte >> PT64_NX_SHIFT); in FNAME()
263 pte_t pte = {.pte = gpte}; in FNAME()
295 gpte |= level - PG_LEVEL_4K - 1; in FNAME()
297 return gpte & PT_PAGE_SIZE_MASK; in FNAME()
534 gfn = gpte_to_gfn(gpte); in FNAME()
919 pt_element_t gpte; in FNAME() local
1024 pt_element_t gpte; in FNAME() local
[all …]
/linux-6.3-rc2/arch/powerpc/include/asm/
A Dkvm_book3s.h186 struct kvmppc_pte *gpte, u64 root,
189 struct kvmppc_pte *gpte, u64 table,
192 struct kvmppc_pte *gpte, bool data, bool iswrite);
/linux-6.3-rc2/Documentation/virt/kvm/x86/
A Dmmu.rst54 gpte guest pte (referring to gfns)
168 first or second 512-gpte block in the guest page table. For second-level
169 page tables, each 32-bit gpte is converted to two 64-bit sptes
279 protected, and synchronize sptes to gptes when a gpte is written.
343 - if successful, we can let the guest continue and modify the gpte
382 we cannot map the permissions for gpte.u=1, gpte.w=0 to any spte (the
400 spte.nx=gpte.nx back. For this to work, KVM forces EFER.NX to 1 when
/linux-6.3-rc2/Documentation/virt/kvm/
A Dlocking.rst94 | gpte = gfn1 |
96 | spte is the shadow page table entry corresponding with gpte and |
113 | | gpte is changed to point to |

Completed in 19 milliseconds