Lines Matching refs:PTE
177 ; OUT: r0 = PTE faulted on, r1 = ptr to PTE, r2 = Faulting V-address
196 ; Get the PTE entry: The idea is
204 ld.aw r0, [r1, r0] ; get PTE and PTE ptr for fault addr
217 ; Convert Linux PTE entry into TLB entry
218 ; A one-word PTE entry is programmed as two-word TLB Entry [PD0:PD1] in mmu
219 ; IN: r0 = PTE, r1 = ptr to PTE
227 and r3, r0, PTE_BITS_NON_RWX_IN_PD1 ; Extract PFN+cache bits from PTE
232 and r2, r0, PTE_BITS_IN_PD0 ; Extract other PTE flags: (V)alid, (G)lb
274 ; Get the PTE corresponding to V-addr accessed, r2 is setup with EFA
278 ; VERIFY_PTE: Check if PTE permissions approp for executing code
283 and r3, r0, r2 ; Mask out NON Flag bits from PTE
289 st_s r0, [r1] ; Write back PTE
313 ; Get the PTE corresponding to V-addr accessed
314 ; If PTE exists, it will setup, r0 = PTE, r1 = Ptr to PTE, r2 = EFA
318 ; VERIFY_PTE: Chk if PTE permissions approp for data access (R/W/R+W)
321 mov_s r2, _PAGE_PRESENT ; common bit for K/U PTE
322 or.hs r2, r2, _PAGE_GLOBAL ; kernel PTE only
324 ; Linux PTE [RWX] bits are semantically overloaded:
331 or.nz r2, r2, _PAGE_READ ; chk for Read flag in PTE
333 or.nz r2, r2, _PAGE_WRITE ; chk for Write flag in PTE
336 ; By now, r2 setup with all the Flags we need to check in PTE
337 and r3, r0, r2 ; Mask out NON Flag bits from PTE
346 st_s r0, [r1] ; Write back PTE