Home
last modified time | relevance | path

Searched refs:gpte (Results 1 – 3 of 3) sorted by relevance

/linux/arch/x86/kvm/mmu/
H A Dpaging_tmpl.h96 static inline gfn_t pse36_gfn_delta(u32 gpte) in pse36_gfn_delta() argument
100 return (gpte & PT32_DIR_PSE36_MASK) << shift; in pse36_gfn_delta()
104 static gfn_t gpte_to_gfn_lvl(pt_element_t gpte, int lvl) in gpte_to_gfn_lvl() argument
106 return (gpte & PT_LVL_ADDR_MASK(lvl)) >> PAGE_SHIFT; in gpte_to_gfn_lvl()
110 unsigned gpte) in FNAME()
122 mask |= (gpte >> (PT_GUEST_DIRTY_SHIFT - PT_WRITABLE_SHIFT)) & in FNAME()
136 static bool FNAME(is_bad_mt_xwr)(struct rsvd_bits_validate *rsvd_check, u64 gpte) in FNAME()
141 return __is_bad_mt_xwr(rsvd_check, gpte); in FNAME()
145 static bool FNAME(is_rsvd_bits_set)(struct kvm_mmu *mmu, u64 gpte, int level) in FNAME()
147 return __is_rsvd_bits_set(&mmu->guest_rsvd_check, gpte, level) || in FNAME()
[all …]
/linux/arch/powerpc/kvm/
H A Dbook3s_64_mmu.c192 struct kvmppc_pte *gpte, bool data, in kvmppc_mmu_book3s_64_xlate() argument
213 gpte->eaddr = eaddr; in kvmppc_mmu_book3s_64_xlate()
214 gpte->vpage = kvmppc_mmu_book3s_64_ea_to_vp(vcpu, eaddr, data); in kvmppc_mmu_book3s_64_xlate()
215 gpte->raddr = vcpu->arch.magic_page_pa | (gpte->raddr & 0xfff); in kvmppc_mmu_book3s_64_xlate()
216 gpte->raddr &= KVM_PAM; in kvmppc_mmu_book3s_64_xlate()
217 gpte->may_execute = true; in kvmppc_mmu_book3s_64_xlate()
218 gpte->may_read = true; in kvmppc_mmu_book3s_64_xlate()
219 gpte->may_write = true; in kvmppc_mmu_book3s_64_xlate()
220 gpte->page_size = MMU_PAGE_4K; in kvmppc_mmu_book3s_64_xlate()
221 gpte->wimg = HPTE_R_M; in kvmppc_mmu_book3s_64_xlate()
[all …]
/linux/Documentation/virt/kvm/x86/
H A Dmmu.rst54 gpte guest pte (referring to gfns)
168 first or second 512-gpte block in the guest page table. For second-level
169 page tables, each 32-bit gpte is converted to two 64-bit sptes
304 protected, and synchronize sptes to gptes when a gpte is written.
368 - if successful, we can let the guest continue and modify the gpte
407 we cannot map the permissions for gpte.u=1, gpte.w=0 to any spte (the
425 spte.nx=gpte.nx back. For this to work, KVM forces EFER.NX to 1 when