Searched full:tables (Results 1 – 22 of 22) sorted by relevance
/kvm-unit-tests/lib/s390x/ |
H A D | mmu.h | 22 * Splits the pagetables down to the given DAT tables level. 25 * @vaddr address whose page tables are to split 31 * Applies the given protection bits to the given DAT tables level, 41 * Clears the given protection bits from the given DAT tables level, 69 * for the given page tables, using 1MB large pages. 78 * for the given page tables, using 2GB huge pages.
|
H A D | mmu.c | 189 * @pgtable root of the page tables 244 * smaller pages existed, all the lower tables are freed. 246 * @pgtable root of the page tables
|
H A D | sie.c | 81 /* switch to home space so guest tables can be different from host */ in sie()
|
/kvm-unit-tests/arm/ |
H A D | Makefile.arm64 | 51 # avoid jump tables before all relocations have been processed 52 arm/efi/reloc_aarch64.o: CFLAGS += -fno-jump-tables
|
/kvm-unit-tests/lib/ |
H A D | efi.c | 109 efi_config_table_t *tables; in efi_get_system_config_table() local 111 tables = (efi_config_table_t *)efi_system_table->tables; in efi_get_system_config_table() 113 if (!memcmp(&table_guid, &tables[i].guid, sizeof(efi_guid_t))) { in efi_get_system_config_table() 114 *table = tables[i].table; in efi_get_system_config_table()
|
H A D | vmalloc.h | 26 /* Map the virtual address to the physical address for the given page tables */
|
H A D | acpi.c | 83 * have use XSDT to find other ACPI tables, otherwise, we use RSDT. in find_acpi_table_addr()
|
H A D | acpi.h | 7 * All tables and structures must be byte-packed to match the ACPI 8 * specification, since the tables are provided by the system firmware.
|
H A D | vmalloc.c | 227 * so that it can be used to allocate page tables. in __setup_vm()
|
/kvm-unit-tests/lib/arm/asm/ |
H A D | page.h | 32 /* For compatibility with arm64 page tables */
|
H A D | sysreg.h | 34 #define CR_XP (1 << 23) /* Extended page tables */
|
H A D | pgtable.h | 58 /* For compatibility with arm64 page tables */
|
H A D | pgtable-hwdef.h | 22 /* For compatibility with arm64 page tables */
|
/kvm-unit-tests/riscv/ |
H A D | Makefile | 105 # avoid jump tables before all relocations have been processed 106 riscv/efi/reloc_riscv64.o: CFLAGS += -fno-jump-tables
|
/kvm-unit-tests/lib/arm64/ |
H A D | gic-v3-its.c | 104 /* Allocate LPI config and pending tables */ in its_enable_defaults()
|
/kvm-unit-tests/lib/arm/ |
H A D | gic-v3.c | 161 * alloc_lpi_tables - Allocate LPI config and pending tables
|
H A D | mmu.c | 276 * the default page tables do identity map all physical addresses, which in __phys_to_virt()
|
/kvm-unit-tests/lib/ppc64/ |
H A D | mmu.c | 255 * the default page tables do identity map all physical addresses, which in __phys_to_virt()
|
/kvm-unit-tests/x86/ |
H A D | svm_npt.c | 214 * The guest's page tables will blow up on a bad PDPE/PML4E, in __svm_npt_rsvd_bits_test()
|
H A D | vmx_tests.c | 1035 * __setup_ept - Setup the VMCS fields to enable Extended Page Tables (EPT) 1078 * setup_ept - Enable Extended Page Tables (EPT) and setup an identity map 1083 * This is the "real" function for setting up EPT tables, i.e. use this for 1108 * setup_dummy_ept - Enable Extended Page Tables (EPT) with a dummy root HPA 1113 * EPT tables. 2439 * Note that paddr violations can also be triggered by loading PAE page tables 2491 * identity map (gpa = gpa) since page tables are shared with the host. in ept_access_paddr()
|
H A D | vmx.c | 1430 * SMEP are off limits because the page tables have the USER in test_vmxon_bad_cr()
|
/kvm-unit-tests/lib/linux/ |
H A D | efi.h | 426 unsigned long tables; member
|