Searched refs:gpte (Results 1 – 3 of 3) sorted by relevance
| /linux/arch/x86/kvm/mmu/ |
| H A D | paging_tmpl.h | 96 static inline gfn_t pse36_gfn_delta(u32 gpte) in pse36_gfn_delta() argument 100 return (gpte & PT32_DIR_PSE36_MASK) << shift; in pse36_gfn_delta() 104 static gfn_t gpte_to_gfn_lvl(pt_element_t gpte, int lvl) in gpte_to_gfn_lvl() argument 106 return (gpte & PT_LVL_ADDR_MASK(lvl)) >> PAGE_SHIFT; in gpte_to_gfn_lvl() 110 unsigned gpte) in FNAME() 122 mask |= (gpte >> (PT_GUEST_DIRTY_SHIFT - PT_WRITABLE_SHIFT)) & in FNAME() 136 static bool FNAME(is_bad_mt_xwr)(struct rsvd_bits_validate *rsvd_check, u64 gpte) in FNAME() 141 return __is_bad_mt_xwr(rsvd_check, gpte); in FNAME() 145 static bool FNAME(is_rsvd_bits_set)(struct kvm_mmu *mmu, u64 gpte, int level) in FNAME() 147 return __is_rsvd_bits_set(&mmu->guest_rsvd_check, gpte, level) || in FNAME() [all …]
|
| /linux/arch/powerpc/kvm/ |
| H A D | book3s_64_mmu.c | 192 struct kvmppc_pte *gpte, bool data, in kvmppc_mmu_book3s_64_xlate() argument 213 gpte->eaddr = eaddr; in kvmppc_mmu_book3s_64_xlate() 214 gpte->vpage = kvmppc_mmu_book3s_64_ea_to_vp(vcpu, eaddr, data); in kvmppc_mmu_book3s_64_xlate() 215 gpte->raddr = vcpu->arch.magic_page_pa | (gpte->raddr & 0xfff); in kvmppc_mmu_book3s_64_xlate() 216 gpte->raddr &= KVM_PAM; in kvmppc_mmu_book3s_64_xlate() 217 gpte->may_execute = true; in kvmppc_mmu_book3s_64_xlate() 218 gpte->may_read = true; in kvmppc_mmu_book3s_64_xlate() 219 gpte->may_write = true; in kvmppc_mmu_book3s_64_xlate() 220 gpte->page_size = MMU_PAGE_4K; in kvmppc_mmu_book3s_64_xlate() 221 gpte->wimg = HPTE_R_M; in kvmppc_mmu_book3s_64_xlate() [all …]
|
| /linux/Documentation/virt/kvm/x86/ |
| H A D | mmu.rst | 54 gpte guest pte (referring to gfns) 168 first or second 512-gpte block in the guest page table. For second-level 169 page tables, each 32-bit gpte is converted to two 64-bit sptes 304 protected, and synchronize sptes to gptes when a gpte is written. 368 - if successful, we can let the guest continue and modify the gpte 407 we cannot map the permissions for gpte.u=1, gpte.w=0 to any spte (the 425 spte.nx=gpte.nx back. For this to work, KVM forces EFER.NX to 1 when
|