Home
last modified time | relevance | path

Searched refs:PTE (Results 1 – 25 of 27) sorted by relevance

12

/Linux-v4.19/arch/arc/mm/
Dtlbex.S194 ; OUT: r0 = PTE faulted on, r1 = ptr to PTE, r2 = Faulting V-address
215 bnz.d 2f ; YES: PGD == PMD has THP PTE: stop pgd walk
221 ; Get the PTE entry: The idea is
235 ld.aw r0, [r1, r0] ; r0: PTE (lower word only for PAE40)
236 ; r1: PTE ptr
243 ; Convert Linux PTE entry into TLB entry
244 ; A one-word PTE entry is programmed as two-word TLB Entry [PD0:PD1] in mmu
245 ; (for PAE40, two-words PTE, while three-word TLB Entry [PD0:PD1:PD1HI])
246 ; IN: r0 = PTE, r1 = ptr to PTE
254 and r3, r0, PTE_BITS_NON_RWX_IN_PD1 ; Extract PFN+cache bits from PTE
[all …]
/Linux-v4.19/Documentation/vm/
Dsplit_page_table_lock.rst13 access to the table. At the moment we use split lock for PTE and PMD
19 maps pte and takes PTE table lock, returns pointer to the taken
22 unlocks and unmaps PTE table;
24 allocates PTE table if needed and take the lock, returns pointer
27 returns pointer to PTE table lock;
33 Split page table lock for PTE tables is enabled compile-time if
37 Split page table lock for PMD tables is enabled, if it's enabled for PTE
57 There's no need in special enabling of PTE split page table lock:
59 which must be called on PTE table allocation / freeing.
97 The spinlock_t allocated in pgtable_page_ctor() for PTE table and in
Dremap_file_pages.rst18 PTE for this purpose. PTE flags are scarce resource especially on some CPU
Dtranshuge.rst130 - map/unmap of the pages with PTE entry increment/decrement ->_mapcount
153 File pages get PG_double_map set on first map of the page with PTE and
Dhighmem.rst141 advantage is that PAE has more PTE bits and can provide advanced features
Dzswap.rst86 During a page fault on a PTE that is a swap entry, frontswap calls the zswap
Dunevictable-lru.rst456 We handle this by keeping PTE-mapped huge pages on normal LRU lists: the
457 PMD on border of VM_LOCKED VMA will be split into PTE table.
/Linux-v4.19/arch/sparc/include/asm/
Dpgalloc_64.h70 #define pmd_populate_kernel(MM, PMD, PTE) pmd_set(MM, PMD, PTE) argument
71 #define pmd_populate(MM, PMD, PTE) pmd_set(MM, PMD, PTE) argument
Dpgalloc_32.h59 #define pmd_populate_kernel(MM, PMD, PTE) pmd_set(PMD, PTE) argument
/Linux-v4.19/Documentation/admin-guide/mm/
Dsoft-dirty.rst7 The soft-dirty is a bit on a PTE which helps to track which pages a task
20 64-bit qword is the soft-dirty one. If set, the respective PTE was
27 the soft-dirty bit on the respective PTE.
33 bits on the PTE.
38 the same place. When unmap is called, the kernel internally clears PTE values
Didle_page_tracking.rst111 more page flag is introduced, the Young flag. When the PTE Accessed bit is
113 is set on the page. The reclaimer treats the Young flag as an extra PTE
Dpagemap.rst129 a PTE. To make sure the flag is up-to-date one has to read
/Linux-v4.19/Documentation/virtual/kvm/
Dlocking.txt157 page (via kvm_mmu_notifier_clear_flush_young), it marks the PTE as not-present
158 by clearing the RWX bits in the PTE and storing the original R & X bits in
160 PTE (using the ignored bit 62). When the VM tries to access the page later on,
162 to atomically restore the PTE to a Present state. The W bit is not saved when
163 the PTE is marked for access tracking and during restoration to the Present
Dhypercalls.txt55 Purpose: Support MMU operations such as writing to PTE,
/Linux-v4.19/arch/microblaze/include/asm/
Dmmu.h39 } PTE; typedef
/Linux-v4.19/Documentation/admin-guide/
Dl1tf.rst47 table entry (PTE) has the Present bit cleared or other reserved bits set,
48 then speculative execution ignores the invalid PTE and loads the referenced
50 by the address bits in the PTE was still present and accessible.
72 PTE which is marked non present. This allows a malicious user space
75 encoded in the address bits of the PTE, thus making attacks more
78 The Linux kernel contains a mitigation for this attack vector, PTE
92 PTE inversion mitigation for L1TF, to attack physical host memory.
132 'Mitigation: PTE Inversion' The host protection is active
136 information is appended to the 'Mitigation: PTE Inversion' part:
578 - PTE inversion to protect against malicious user space. This is done
/Linux-v4.19/arch/xtensa/
DKconfig.debug8 This check can spot missing TLB invalidation/wrong PTE permissions/
/Linux-v4.19/Documentation/
DIntel-IOMMU.txt105 DMAR:[fault reason 05] PTE Write access is not set
107 DMAR:[fault reason 05] PTE Write access is not set
/Linux-v4.19/arch/arm/mm/
Dproc-macros.S112 #error PTE shared bit mismatch
117 #error Invalid Linux PTE bit settings
/Linux-v4.19/arch/nds32/kernel/
Dex-entry.S73 .long do_page_fault !PTE not present
/Linux-v4.19/arch/sparc/kernel/
Dsun4v_tlb_miss.S82 mov %g3, %o2 ! PTE
125 mov %g3, %o2 ! PTE
/Linux-v4.19/Documentation/x86/
Dpti.txt53 userspace page tables to manage. One PTE to lock, one set of
/Linux-v4.19/arch/arm/boot/dts/
Dimx6q-novena.dts2 * Copyright 2015 Sutajio Ko-Usagi PTE LTD
/Linux-v4.19/Documentation/devicetree/bindings/
Dvendor-prefixes.txt201 kosagi Sutajio Ko-Usagi PTE Ltd.
/Linux-v4.19/Documentation/powerpc/
Dfirmware-assisted-dump.txt51 also save system registers, and hardware PTE's.

12