/openbmc/linux/drivers/gpu/drm/msm/ |
H A D | msm_iommu.c | 36 static size_t calc_pgsize(struct msm_iommu_pagetable *pagetable, in calc_pgsize() argument 46 pgsizes = pagetable->pgsize_bitmap & GENMASK(__fls(size), 0); in calc_pgsize() 62 pgsizes = pagetable->pgsize_bitmap & ~GENMASK(pgsize_idx, 0); in calc_pgsize() 94 struct msm_iommu_pagetable *pagetable = to_pagetable(mmu); in msm_iommu_pagetable_unmap() local 95 struct io_pgtable_ops *ops = pagetable->pgtbl_ops; in msm_iommu_pagetable_unmap() 100 pgsize = calc_pgsize(pagetable, iova, iova, size, &count); in msm_iommu_pagetable_unmap() 110 iommu_flush_iotlb_all(to_msm_iommu(pagetable->parent)->domain); in msm_iommu_pagetable_unmap() 118 struct msm_iommu_pagetable *pagetable = to_pagetable(mmu); in msm_iommu_pagetable_map() local 119 struct io_pgtable_ops *ops = pagetable->pgtbl_ops; in msm_iommu_pagetable_map() 132 pgsize = calc_pgsize(pagetable, addr, phys, size, &count); in msm_iommu_pagetable_map() [all …]
|
/openbmc/linux/arch/mips/mm/ |
H A D | pgtable-64.c | 49 unsigned long pagetable = (unsigned long)invalid_pte_table; in pmd_init() local 55 p[0] = pagetable; in pmd_init() 56 p[1] = pagetable; in pmd_init() 57 p[2] = pagetable; in pmd_init() 58 p[3] = pagetable; in pmd_init() 59 p[4] = pagetable; in pmd_init() 61 p[-3] = pagetable; in pmd_init() 62 p[-2] = pagetable; in pmd_init() 63 p[-1] = pagetable; in pmd_init() 73 unsigned long pagetable = (unsigned long)invalid_pmd_table; in pud_init() local [all …]
|
/openbmc/linux/arch/loongarch/mm/ |
H A D | pgtable.c | 75 unsigned long pagetable = (unsigned long)invalid_pte_table; in pmd_init() local 81 p[0] = pagetable; in pmd_init() 82 p[1] = pagetable; in pmd_init() 83 p[2] = pagetable; in pmd_init() 84 p[3] = pagetable; in pmd_init() 85 p[4] = pagetable; in pmd_init() 87 p[-3] = pagetable; in pmd_init() 88 p[-2] = pagetable; in pmd_init() 89 p[-1] = pagetable; in pmd_init() 99 unsigned long pagetable = (unsigned long)invalid_pmd_table; in pud_init() local [all …]
|
/openbmc/linux/arch/x86/mm/ |
H A D | mem_encrypt_identity.c | 88 * more than enough pagetable pages. 93 * section is 2MB aligned to allow for simple pagetable setup using only 256 * Perform a relatively simplistic calculation of the pagetable in sme_pgtable_calc() 276 * Now calculate the added pagetable structures needed to populate in sme_pgtable_calc() 347 * pagetable structures for the encryption of the kernel in sme_encrypt_kernel() 348 * pagetable structures for workarea (in case not currently mapped) in sme_encrypt_kernel() 368 * the pagetable area. The start of the workarea is already 2MB in sme_encrypt_kernel() 377 * Set the address to the start of where newly created pagetable in sme_encrypt_kernel() 378 * structures (PGDs, PUDs and PMDs) will be allocated. New pagetable in sme_encrypt_kernel() 386 * Make sure the current pagetable structure has entries for in sme_encrypt_kernel() [all …]
|
/openbmc/linux/drivers/staging/media/atomisp/pci/ |
H A D | ia_css_mmu_private.h | 22 * This function sets the L1 pagetable address. 23 * After power-up of the ISP the L1 pagetable can be set. 24 * Once being set the L1 pagetable is protected against
|
/openbmc/linux/arch/x86/xen/ |
H A D | mmu_pv.c | 10 * Xen allows guests to directly update the pagetable, in a controlled 11 * fashion. In other words, the guest modifies the same pagetable 13 * a separate shadow pagetable. 21 * inserted directly into the pagetable. When creating a new 26 * The other constraint is that all pages which make up a pagetable 28 * guest updates to the pagetable. Xen strictly enforces this, and 29 * will disallow any pagetable update which will end up mapping a 30 * pagetable page RW, and will disallow using any writable page as a 31 * pagetable. 33 * Naively, when loading %cr3 with the base of a new pagetable, Xen [all …]
|
/openbmc/linux/include/xen/interface/hvm/ |
H A D | hvm_op.h | 19 /* Hint from PV drivers for pagetable destruction. */ 22 /* Domain with a pagetable about to be destroyed. */ 24 /* guest physical address of the toplevel pagetable dying */
|
/openbmc/qemu/block/ |
H A D | vpc.c | 142 uint32_t *pagetable; member 396 s->pagetable = qemu_try_blockalign(bs->file->bs, pagetable_size); in vpc_open() 397 if (s->pagetable == NULL) { in vpc_open() 406 s->pagetable, 0); in vpc_open() 408 error_setg(errp, "Error reading pagetable"); in vpc_open() 416 be32_to_cpus(&s->pagetable[i]); in vpc_open() 417 if (s->pagetable[i] != 0xFFFFFFFF) { in vpc_open() 418 int64_t next = (512 * (int64_t) s->pagetable[i]) + in vpc_open() 467 qemu_vfree(s->pagetable); in vpc_open() 503 if (pagetable_index >= s->max_table_entries || s->pagetable[pagetable_index] == 0xffffffff) in get_image_offset() [all …]
|
/openbmc/linux/drivers/iommu/ |
H A D | Kconfig | 22 menu "Generic IOMMU Pagetable Support" 24 # Selected by the actual pagetable implementations 34 Enable support for the ARM long descriptor pagetable format. 53 Enable support for the ARM Short-descriptor pagetable format. 73 Enable support for the Apple DART pagetable formats. These include
|
H A D | omap-iommu-debug.c | 240 DEFINE_SHOW_ATTRIBUTE(pagetable); 255 debugfs_create_file("pagetable", 0400, d, obj, &pagetable_fops); in omap_iommu_debugfs_add()
|
/openbmc/linux/arch/powerpc/mm/ptdump/ |
H A D | hashpagetable.c | 6 * the hash pagetable, along with their flags to 457 * Traverse the linux pagetable structure and dump pages that are in in walk_pagetables() 458 * the hash pagetable. in walk_pagetables() 475 * that are in the hash pagetable. in walk_linearmapping() 492 * pagetable. in walk_vmemmap() 524 * dump pages that are in the hash pagetable. in ptdump_show()
|
/openbmc/linux/include/xen/interface/ |
H A D | xen.h | 123 * @foreigndom[31:16]: PFD, the expected owner of pagetable pages referenced 142 * pages that make up a pagetable must be mapped read-only in the guest. 143 * This prevents uncontrolled guest updates to the pagetable. Xen strictly 144 * enforces this, and will disallow any pagetable update which will end up 145 * mapping pagetable page RW, and will disallow using any writable page as a 146 * pagetable. In practice it means that when constructing a page table for a 158 * operation on PGD (L4) pagetable entries that have a PUD (L3) entry. 173 * pagetable MUST not be in use (meaning that the cr3 is not set to it). 207 * HYPERVISOR_mmuext_op serve as mechanism to set a pagetable to be 4MB
|
/openbmc/linux/Documentation/userspace-api/ |
H A D | iommufd.rst | 100 pagetable already exists then it is reused for the attachment. Otherwise a 101 new pagetable object and iommu_domain is created. Successful completion of 132 target pagetable to be attached to by a device. Though currently there are
|
/openbmc/linux/arch/arm64/include/asm/ |
H A D | kernel-pgtable.h | 44 * For each pagetable level of the swapper, we know that the shift will 47 * KASLR can increase the number of pagetable entries by 1, so we make
|
/openbmc/linux/arch/hexagon/include/asm/ |
H A D | page.h | 67 * asm-generic/pagetable-nopmd.h and asm-generic/pagetable-nopud.h
|
/openbmc/linux/arch/powerpc/platforms/ps3/ |
H A D | Kconfig | 38 int "PS3 Platform pagetable size" if PS3_ADVANCED 43 tune the pagetable size on their system. The value here is
|
/openbmc/qemu/include/hw/xen/interface/hvm/ |
H A D | hvm_op.h | 116 /* Hint from PV drivers for pagetable destruction. */ 119 /* Domain with a pagetable about to be destroyed. */ 122 /* guest physical address of the toplevel pagetable dying */
|
/openbmc/linux/drivers/gpu/drm/vmwgfx/ |
H A D | vmwgfx_mob.c | 405 * vmw_mob_pt_populate - Populate the mob pagetable 407 * @mob: Pointer to the mob the pagetable of which we want to 410 * This function allocates memory to be used for the pagetable. 447 * vmw_mob_build_pt - Build a pagetable 488 * vmw_mob_build_pt - Set up a multilevel mob pagetable
|
/openbmc/linux/mm/ |
H A D | mapping_dirty_helpers.c | 11 * struct wp_walk - Private struct for pagetable walk callbacks 29 * @walk: pagetable walk callback argument 81 * @walk: pagetable walk callback argument
|
/openbmc/linux/arch/x86/include/asm/ |
H A D | init.h | 13 unsigned long kernpg_flag; /* kernel pagetable flag override */
|
H A D | tlb.h | 27 * a hypercall. To keep software pagetable walkers safe in this case we
|
H A D | paravirt_types.h | 163 /* Hooks for allocating and freeing a pagetable top-level */ 168 * Hooks for allocating/releasing pagetable pages when they're 169 * attached to a pagetable 180 /* Pagetable manipulation functions */
|
/openbmc/openbmc/poky/bitbake/lib/toaster/toastergui/templates/ |
H A D | bfile.html | 4 {% block pagetable %}
|
/openbmc/qemu/include/hw/xen/interface/ |
H A D | xen.h | 202 * @foreigndom[31:16]: PFD, the expected owner of pagetable pages referenced 221 * pages that make up a pagetable must be mapped read-only in the guest. 222 * This prevents uncontrolled guest updates to the pagetable. Xen strictly 223 * enforces this, and will disallow any pagetable update which will end up 224 * mapping pagetable page RW, and will disallow using any writable page as a 225 * pagetable. In practice it means that when constructing a page table for a 237 * operation on PGD (L4) pagetable entries that have a PUD (L3) entry. 252 * pagetable MUST not be in use (meaning that the cr3 is not set to it). 290 * HYPERVISOR_mmuext_op serve as mechanism to set a pagetable to be 4MB
|
/openbmc/linux/include/linux/ |
H A D | mem_encrypt.h | 24 * the encryption mask from a value (e.g. when dealing with pagetable
|