Searched refs:accessed_dirty (Results 1 – 4 of 4) sorted by relevance
64 bool accessed_dirty, gpa_t new_eptp);
320 unsigned index, accessed_dirty, pte_pkey; in FNAME() local424 accessed_dirty = have_ad ? pte_access & PT_GUEST_ACCESSED_MASK : 0; in FNAME()453 accessed_dirty &= pte >> in FNAME()456 if (unlikely(!accessed_dirty)) { in FNAME()
4616 kvm_calc_shadow_ept_root_page_role(struct kvm_vcpu *vcpu, bool accessed_dirty, in kvm_calc_shadow_ept_root_page_role() argument4627 role.base.ad_disabled = !accessed_dirty; in kvm_calc_shadow_ept_root_page_role()4645 bool accessed_dirty, gpa_t new_eptp) in kvm_init_shadow_ept_mmu() argument4650 kvm_calc_shadow_ept_root_page_role(vcpu, accessed_dirty, in kvm_init_shadow_ept_mmu()4661 context->ept_ad = accessed_dirty; in kvm_init_shadow_ept_mmu()
5444 bool accessed_dirty; in nested_vmx_eptp_switching() local5459 accessed_dirty = !!(new_eptp & VMX_EPTP_AD_ENABLE_BIT); in nested_vmx_eptp_switching()5470 mmu->ept_ad = accessed_dirty; in nested_vmx_eptp_switching()5471 mmu->mmu_role.base.ad_disabled = !accessed_dirty; in nested_vmx_eptp_switching()